- Basic Computer :
- Computer Fundamentals
- Hardware : CPU (ALU , CU) , RAM/ROM , Storage (HDD, SSD)
- Software : System Software (OS) , Application Software
- Number System : Binary , Decimal , Hexadecimal
- Internet : IP address , DNS , HTTP/HTTPS Basics
- Networking :
- OSI Model
- TCP/IP Model
- IP Address: IPv4 structure , Private vs Public IP
- Subnetting (CIDR, subnet mask)
- MAC Address
- Protocols: HTTP, HTTPS , FTP, SMTP, DNS, SSH
- Ports & Services
- Network devices: Router, Switch, Hub
- Operating System (Linux Deep):
- OS working (process, memory, file system)
- Linux commands:
- ls, cd, PWD, MKDIR, rm
- File permissions:
- read, write, execute
- User management
- Process:
- PS, top, kill
- Package manager (apt)
- Kali Linux setup
- Bash scripting basics
- Cyber Security Basics :
- CIA Triad
- Types of hackers
- Threat, Vulnerability, Risk
- Types of attacks:
- Phishing
- Malware (Virus, Trojan)
- Ransomware
- DDoS
- Social Engineering
- Security Fundamentals :
- Firewall types
- IDS vs IPS
- Encryption:
- Symmetric (AES)
- Asymmetric (RSA)
- Hashing:
- MD5, SHA
- Authentication:
- Password, OTP, MFA
- Authorization & Access control
- Programming (Cyber Security Focus) :
- Python: Variables, loops, functions, File handling, Requests library
- Bash scripting
- JavaScript basics: DOM
- Basic networking scripts
- Web Security (Advanced Important ) :
- Web working: Client-server, Request/Response
- HTTP methods (GET, POST)
- Cookies & Sessions
- OWASP Top 10: SQL Injection, XSS, CSRF
- Authentication flaws
- File upload vulnerability
- Ethical Hacking :
- Reconnaissance: WHOIS, Google Dorking
- Scanning: Nmap
- Enumeration
- Exploitation
- Privilege escalation
- Post exploitation
- Tools :
- Nmap commands
- Wireshark packet analysis
- Burp Suite: Intercept request,
- Metasploit : Exploit run
