Alpha Academy

  • Category: Cybersecurity Trainings
  • Upon completion: Diploma/Certificate
  • Sample certificate: View

Advanced Diploma in CyberSecurity

Ethical hacking is the process of identifying vulnerabilities in a computer system or network and figuring out how to best protect them. It isn’t an easy task to perform, but with our ethical hacking training course, we make it as easy as possible for you.

Cybersecurity is one of the fastest growing field. The application and cloud security fields alone are estimated to grow 164% and 115% respectively.

The course begins with the basics, teaching you how to set up your lab and understand some of the key terms that may be used. After that, we get into how to actually hack networks by using Kali Linux installation and then navigating through it efficiently. Throughout the course you'll learn about what steps hackers take and what tools they use in their hacking process. This category is best suited for individuals who want to start their career or switch their domain to cybersecurity. The course offers introduction to the cybersecurity domain, terminologies, attacks and their corresponding practicals that would enable you to gain knowledge to safeguard your networks from attackers. This course is therefore designed to get you started into Cybersecurity and is suitable for student of any IT professional who want to develop career in Cybersecurity. This course assumes you have NO prior knowledge. The course covers topics from ground level and take you to mastery levels. The course is regularly updated to cover the latest topics. By the end of it you'll be able to hack systems and also secure them.

CYBER SECURITY, career builder program by industry experts


Cybersecurity Jargon

This module helps to understand cybersecurity jargon, explore different fields of cybersecurity and talks about cybersecurity standards and compliance.

  • Introduction to hacking and hackers
  • Scope in Ethical hacking
  • Hacker classes
  • Hacking phases
  • Threat, risk and vulnerabilities
  • Information Security Controls
  • Defense-in-Depth
  • Vulnerability Assessment
  • Penetration testing concepts and phases
  • Information security standards
  • Introduction to Compliance [PCI-DSS, HIPAA, ISO]
  • OSI model

  • Introduction to Linux

    This module uncovers the working of Linux Operating System and makes you able to write scripts for automation.

  • History
  • Introduction
  • Types of Linux distributions
  • Linux File System
  • Linux boot process
  • Basic commands
  • Network management
  • Managing system drivers
  • Bash Scripting
  • Intelligence Gathering

    Learn how to gather information about your target, be it network, web application or an individual.

  • Introduction to footprinting
  • Passive Footprinting
  • Advanced Google hacking techniques
  • Google Hacking database
  • Active Footprinting
  • Mirror a website
  • Tracking website for changes
  • Footprinting domain and subdomains
  • Passive Network footprinting
  • Email footprinting
  • DNS and footprinting

  • Scanning

    This module reveals the types of scanning with complete hands-on experience. Three types of scanning

  • Introduction and types of Scanning
  • Introduction to ports, protocols and services
  • Banner Grabbing
  • Nmap and various types of scanning methods
  • Network Scanning using Nmap
  • Vulnerability Scanning
  • Detecting and Evading Firewalls
  • Network discovery and mapping
  • Analysing a Network diagram
  • Scanning with your mobile
  • Enumeration

    Also called as 'reconnaissance', this phase is used to identify possible entry points to target systems.

  • What is enumeration
  • Enumerating services
  • DNS enumeration
  • FTP enumeration
  • LDAP enumeration
  • NTP enumeration
  • SMTP enumeration
  • SMB enumeration
  • SNMP enumeration
  • System Hacking

    This module is designed to uncover the secrets of password attacks like cracking hashes, dumping passwords and hacking into target machine.

  • Online and offline Password attacks
  • Cracking hashes
  • Password recovery tools
  • Keyloggers
  • Trojans
  • Rootkits and installing a rootkit
  • Steganography
  • Introduction to Privilege Escalation
  • Network Attacks

    Learn about the various types of attack scenarios possible in a network.

  • Network sniffing
  • Sniffing tools
  • MITM attacks
  • Lawful Interception
  • DHCP attacks
  • MAC flooding
  • ARP poisoning
  • DNS poisoning
  • Wireshark
  • Filters of wireshark
  • Detection of Sniffing over a network
  • Social Engineering

    Social Engineering is called as "The Art of Human Hacking". Human is the weakest element of Security and this module uncovers the secret behind the concept.

  • What is social engineering?
  • Social Engineering Concepts
  • Phases of a social engineering attack
  • Social Engineering Techniques
  • Human-based social engineering
  • Phishing Attacks
  • Harvesting Emails
  • Impersonation on Social Media
  • Social networking threats to corporate networks
  • Denial of Service attacks

    A denial-of-service (DoS) attack occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor.

  • DoS/DDoS attacks
  • TCP, UDP and ICMP Flooding
  • Common DoS attack types
  • Application Layer Attacks
  • Volumetric attacks
  • Reflection attacks
  • Domain Name System (DNS) DDoS Attacks
  • DoS attack tools
  • Attacks on various OSI layers
  • Attacking Web Applications

    This module reveals finding vulnerabilities in Web Applications and providing hands on with vulnerable applications

  • What are web applications and servers
  • HTTP headers
  • OWASP standard
  • Using OWASP ZAP/Burp as a Personal Proxy
  • Web Application attacks
    • SQLi
    • XSS
    • CSRF
    • Captcha Bypass
    • Command Injection
    • Local File Inclusion
    • Bruteforce Attacks
  • Wireless attacks

    Understand how a wireless network works and how attackers bypass implemented security.

  • Wireless concepts and terminology
  • Encryption and implemented security
  • WEP vs WPA
  • Revealing Vulnerabilities in Wireless protocols
  • Wardriving
  • Wireless attacks
    • Cracking WEP,WPA2 and WPA3 passwords
    • Rogue access attacks
    • Attacking WPS
    • Various methods to Bypass Captcha portals
    • Wireless DoS attacks
  • Wireless Auditing tools
  • Mobile platform attacks

    Due to easy availability and portability of mobile devices, every individual now have access to one. This module reveals the vulnerabilities in mobile platforms and uncovers various attacks on mobile platforms.

  • Mobile platform vulnerabilities
  • Mobile platform attack vectors
  • Introduction to OWASP mobile top 10
  • Mobile malwares
  • Rooting android devices
  • Mobile device management
  • IoT hacking

    With the increasing reach of internet and IOT.

  • Introduction to IoT
  • Architecture of IoT
  • IoT application and devices
  • IoT vulnerabilities
  • Protocols in IoT
  • IoT Attacks
  • OWASP top 10 IoT vulnerabilities and obstacles
  • IoT attack surface areas
  • Hacking IoT devices
  • Defend against attacks
  • IoT framework
  • IoT security tools
  • Cloud security

    Learn about the cloud architecture and vulnerabilities in a cloud infrastructure.

  • Introduction to Cloud computing and architecture
  • Cloud deployement models
  • Cloud computing terminology
  • Vulnerabilities in cloud architecture
  • Attacks in Cloud infrastructure
  • Privacy

    Learn about methods to stay anonymous and secure yourself over Internet.

  • Introduction to Privacy
  • Data leakage over internet
  • How tracking works
  • Staying secure over internet
  • Defeating snooping and tracking with privacy enhanced tools
  • CTF

    At last solve provided CTF's to test your skills

    Course Duration

    This is a 40 day instructor led course with 2 hour classes each day. Students can also opt for weekend batches.

    How to enroll

    Drop us an email from below form along with your contact details, and we will get back to you.



    Got Questions? We are just an email away!




    +91 93685 75559

    Your message has been sent. Thank you!