← Back to Academy
// curriculum map

Ethical Hacking Syllabus

Master cybersecurity through hands-on missions. Each module builds critical skills with real-world scenarios and live lab environments.

MODULE 01
Network Recon
Information gathering and network mapping fundamentals
nmapwiresharkosint
Network Reconnaissance
Learn passive and active information gathering techniques. Master port scanning, service enumeration, and network topology mapping using industry-standard tools.
MODULE 02
Web Exploitation
OWASP Top 10 vulnerabilities and web application security
sqlixsscsrfssrf
Web Application Security
Exploit common web vulnerabilities including injection attacks, broken authentication, and insecure direct object references. Practice on live vulnerable applications.
MODULE 03
System Exploitation
Buffer overflows, privilege escalation, and post-exploitation
buffer-overflowprivescshells
System-Level Exploitation
Advanced exploitation techniques including memory corruption, return-oriented programming, and maintaining persistent access on compromised systems.
MODULE 04
Wireless Security
WiFi attacks, Bluetooth exploitation, and radio frequency analysis
wifibluetoothrfid
Wireless Network Security
Attack wireless protocols and devices. Learn WPA/WPA2 cracking, evil twin attacks, and Bluetooth exploitation techniques using specialized hardware.
MODULE 05
Cryptography
Encryption algorithms, hash functions, and cryptographic attacks
aesrsahashingpki
Applied Cryptography
Understand modern encryption standards and their weaknesses. Practice cryptanalysis, side-channel attacks, and implementation flaws in real-world systems.
MODULE 06
Social Engineering
Human psychology, phishing campaigns, and physical security
phishingpretextingosint
Human Factor Exploitation
Master the art of social manipulation. Design convincing phishing campaigns, practice pretexting scenarios, and understand psychological triggers in security contexts.
MODULE 07
Mobile Security
iOS and Android application security testing
androidiosfrida
Mobile Application Security
Reverse engineer mobile applications, bypass security controls, and exploit platform-specific vulnerabilities using dynamic instrumentation frameworks.
MODULE 08
Cloud Security
AWS, Azure, and GCP security misconfigurations
awsazurek8sdocker
Cloud Infrastructure Security
Advanced cloud penetration testing. Exploit IAM misconfigurations, container escapes, and serverless vulnerabilities across major cloud platforms.
MODULE 09
Malware Analysis
Reverse engineering and dynamic analysis techniques
ida-proghidrasandbox
Malware Reverse Engineering
Dissect malicious software using static and dynamic analysis. Learn unpacking techniques, anti-analysis evasion, and behavioral analysis in isolated environments.
MODULE 10
Digital Forensics
Incident response and evidence collection procedures
volatilityautopsytimeline
Digital Forensics & Incident Response
Investigate security incidents using forensic tools. Master memory analysis, disk imaging, and timeline reconstruction for legal and security purposes.
MODULE 11
Red Team Operations
Advanced persistent threats and stealth techniques
c2evasionpersistence
Advanced Red Team Tactics
Simulate sophisticated adversaries. Master command and control frameworks, detection evasion, and long-term persistence in enterprise environments.
MODULE 12
Blue Team Defense
Detection engineering and security monitoring
siemsigmayarathreat-hunting
Defensive Security Operations
Build robust detection capabilities. Create custom rules, analyze security logs, and develop threat hunting methodologies to identify advanced attacks.
Prerequisites & Recommendations
• Basic Linux command line proficiency
• Understanding of TCP/IP networking fundamentals
• Programming experience (Python, C, or JavaScript preferred)
• Virtual machine setup capability (VMware/VirtualBox)
freevisitorcounters