Ethical Hacking & Cyber Security
Beginner → Intermediate
- Networking, OSINT & Kali Linux
- OWASP Top 10 & Web Security
- Malware & Social Engineering
VAPT – Professional Pentesting
3 Months | Advanced
- Web, Network & Mobile Pentesting
- Burp, Nessus, SQLMap
- Reporting & Interview Prep
Advanced Bug Bounty Hunting
Advanced
- IDOR, XSS, SQLi, OTP Bypass
- WordPress & Auth Bugs
- HackerOne & Bugcrowd
API Testing & API Security
15 Modules
- REST, SOAP, GraphQL
- Postman & Newman
- OWASP API Top 10
Cloud Security (AWS / Azure / GCP)
Intermediate → Advanced
- IAM, CSPM & Cloud IR
- Kubernetes Security
- Cloud Capstone
Blockchain & Web3 Security
Smart Contracts & DeFi
- Smart Contract Auditing
- DeFi & NFT Attacks
- Slither & Mythril
CCNA Networking (200-301)
Networking Fundamentals
- Routing & Switching
- VLANs & Subnetting
- Network Security Basics
Cyber Security & Ethical Hacking with AI
AI-Driven Security
- AI-assisted Recon & Attacks
- SOC & SIEM with AI
- AI Capstone Project
Mobile Application Penetration Testing
Android & iOS
- Static & Dynamic Analysis
- SSL Pinning Bypass
- OWASP Mobile Top 10
OSINT – Open Source Intelligence
Threat Intelligence
- People & Social Media OSINT
- Dark Web Monitoring
- Investigation Capstone
Reverse Engineering & Malware Analysis
Advanced
- Windows & Android Reversing
- Static & Dynamic Malware Analysis
- Real Malware Case Studies