KaaShiv's Training Program will provide you with in-depth knowledge in Cyber security
5 of (8k+ satisfied learners)
Most popular course on Cyber security trusted by over 50,000 students! Built with years of experience by industry experts and gives you a complete package of video lectures, practice problems, quizzes. Start Today!
Available for 5 Days to
SignIn to BuyCyber security Internship excellent to learn
Get Job from Top Companies with this Internship
Average Salary
Rs.5,00,000 - 8,00,000 / Year
Topic | Text Material | Image content | Video content | Quiz |
---|---|---|---|---|
Cyber Security Syllabus | - | |||
Cyber Security Introduction | - | |||
Types of Cyber Threats | - | |||
Types of Hackers | - | |||
Famous Hackers cyber security | - | |||
How Client Server Works | - | |||
Client files and Server files | - | |||
How Client files and Server files are placed | - | |||
Cyber Security Live Class Day 1 | 1 video | |||
Role of Cyber Security Professionals | - | |||
Role of Ethical hackers | - | |||
Skills for Cyber Security Engineers | - | |||
Introduction to CCNA | - | |||
Cyber Security Principles | - | |||
Role of Cyber Security in our life | - | |||
Practical Implementation of Website Cloning | - | |||
Cyber Security Live Class Day 2 | 1 video | |||
Hacking Procedures followed by Hackers | - | |||
Environmental Setup cyber security | - | |||
Pretty Good Privacy | - | |||
Malware Properties | - | |||
Basic of Network | - | |||
Purpose behind Hacking | - | |||
Data Breach Introduction | - | |||
Cyber Security Live Class Day 3 | - | |||
How Malwares Spreads | - | |||
Malwares | - | |||
Adware | - | |||
Cyber Security Live Class Day 4 | - | |||
Cyber Security Live Class Day 5 | - | |||
Cyber Security Incidents | - | |||
Cyber Security Live Class Day 6 | - | |||
Social Engineering in Cyber Security | - | |||
Cyber Security Live Class Day 7 | - | |||
Phishing Attack in Social Engieering | - | |||
Cyber Security Live Class Day 8 | - | |||
Types of Phishing | - | |||
Cyber Security Live Class Day 9 | - | |||
Trojan Horses in Cyber Security | - | |||
Cyber Security Live Class Day 10 | - | |||
Cyber Security Live Class Day 11 | - | |||
Process of Reverse Engineering | - | |||
Cyber Security Live Class Day 12 | - | |||
Malware Analysis Tools | - | |||
Threat Intelligence | - | |||
Cyber Security Live Class Day 13 | - | |||
Cyber Crime in India | - | |||
Computer Security | - | |||
Network Penetration Testing | - | |||
Complete reference on Cyber Security | - | |||
Data Recovery Techniques | - |
Topic | Text Material | Image content | Video content | Quiz |
---|---|---|---|---|
Pre-connection Attack | - | |||
Top 10 Intelligence agencies of the World | - | |||
Domain Name System | - | |||
About airodump - ng | - | |||
Wireless Interface in Monitor Mode | - | |||
Network Protocol-cyber security | - | |||
Proxy Server cyber security | - | |||
Run airodump - ng | - | |||
Cyber Security Live Class Day 14 | - | |||
Cyber Security Live Class Day 15 | - |
Topic | Text Material | Image content | Video content | Quiz |
---|---|---|---|---|
Hacking Tools cyber security | - | |||
Gaining Access cyber security | - | |||
Various Types of Hacking attacks | - | |||
Deauthenticate the Wireless Client | - | |||
WEP Cracking cyber security | - | |||
Encryption Tools-cyber security | - | |||
WEP Introduction cyber security | - | |||
Hacking Operating Systems | - | |||
Cyber Security Live Class Day 16 | - |
Topic | Text Material | Image content | Video content | Quiz |
---|---|---|---|---|
Fake Authentication Attack | - | |||
WPA Theory-cyber security | - | |||
Pen Test Strategies-cyber security | - | |||
Penetration Testing-cyber security | - | |||
ARP Request Replay Attack | - | |||
Intrusion Detection System and the IDs Tools | - | |||
Capturing handshakes-cyber security | - | |||
Penetration Testing Tool | - | |||
Handshake Theory-cyber security | - |
Topic | Text Material | Image content | Video content | Quiz |
---|---|---|---|---|
Ethical Hacking Tools-cyber security | - | |||
Windows Hacking Tricks | - | |||
Creating wordlist-cyber security | - | |||
Cracking wordlist | - | |||
Secure USB Drives with BitLocker | - | |||
Securing Network from Attack | - | |||
Use Pen drive to fast your computer | - | |||
Post- Connection Attacks | - | |||
Disable Error Reporting in Windows 7 | - |
Topic | Text Material | Image content | Video content | Quiz |
---|---|---|---|---|
How to Display Legal Notice on Start up of your Windows | - | |||
Ultra-speed Shutdown of Windows 7 | - | |||
Netdiscover-cyber security | - | |||
Local Group Policies Related Hacking | - | |||
ARP spoofing using arpspoof | - | |||
Man-in -the-Middle Attacks | - | |||
How to Disable or Enable Folder Options in Windows 7 | - | |||
Zenmap-cyber security | - | |||
Shortcuts Related Hacking | - | |||
ARP spoofing using MITMf | - | |||
DVWA Installation | - | |||
Nmap Series - Cyber Security Live Class Day 17 | - |
Cyber security
Earn official recognition for your work, and share your success with friends, colleagues, and employers.
Ram Prithiv Raju shares her KaaShiv learning experience helped her gain an edge in job interviews and land a job.
Ananthi shares her KaaShiv learning experience helped her gain an edge in job interviews and land a job.
Vignesh shares her KaaShiv learning experience helped her gain an edge in job interviews and land a job.
We have a lifetime 24x7 online support team to resolve all your technical queries, through a ticket based tracking system.
Successfully complete your final course project and Kaashiv will certify you as a Cyber security Expert.
We have a community forum for all our learners that further facilitates learning through peer interaction and knowledge