Your gateway to Cybersecurity skills and careers.

Learn everything about cybercrimes and essential cyber laws to protect your loved ones and support vulnerable victims who need help

Software code testing-pana
Certified Penetration Tester
This certification is a recognized empanelment program for information security professionals with hands-on proven skills in vulnerability assessment and penetration testing (VAPT)
QA engineers-amico
Certified Bug Bounty Researcher
This program is aimed at training cybersecurity enthusiasts in recognition and reporting of bugs, especially those related to security exploits and vulnerabilities, legally and ethically.

Prerequisite

CPT
Recommended to complete Certified Cybercrime Intervention Officer (CCIO) & Certification in Basics of Information Security

CBBR
Recommended to complete Certified Cybercrime Intervention Officer (CCIO) course, Certified in Professional Ethics at Workplace (CPEW) & Certified Penetration Tester (CPT) and should have Coding Experience

Upcoming Batch

CPT

Sep 03, 2022

CBBR

Sep 03, 2022

Course Outcomes

  • Win as a Parent: Being a parent is the most difficult job in this world. As children grow, the digital divide increases the generation gap and makes you a parent feel disconnected. The program helps you understand the online world and its consequences so that you can protect your children and loved ones from potential cybercrimes.
  • Become a better Lawyer: If you are an existing lawyer, you will enhance your cases understandings immensely with this course. This will mean fewer technical mistakes and wider scope of defense.
  • Become a better Police Officer: The program will enhance your ability to connect, speak and discuss with young children and teenagers affected by cybercrimes. You will learn how to remove their fears, give them courage and help you gain crucial details of the case that will fasten the investigations.
  • Become a better Teacher: Being a teacher is a tough job – and when you understand the new age problems of digital kids, it helps you navigate their world without getting lost. With the skills gained in this program, you may be able to intervene just in time before a crime becomes dangerous for the children, causing harm to both the victims and the reputation of the school.
  • Explore Part-time Work Opportunities: The biggest advantage of this program is, this enables you to pick up part-time work opportunities such as:
    • Conducting workshops in schools on cyber safety
    • Working as an Intervention Officer for schools to advise parents and children
    • Assisting lawyers on cyber crime cases
    • Assisting hospitals, counselors and doctors dealing with Cybercrime victims
    You can upgrade your skills to learn Digital Forensics Investigation or become a full time lawyer to enhance full time work opportunities in this area. Both the skills are diverse so do not hesitate to learn more from your Instructors about these skills.
  • Understanding of Basic concepts in information and cyber security.
  • A practical view of the subjects covered
  • Knowledge of Industry-level cyber operations, laws, policies and frameworks.
  • Ability to Identify and respond to security incidents.
  • Skills to assume entry-level positions in Security Operations (Security analyst / JR. Engineer)
  • Win as a Parent: Being a parent is the most difficult job in this world. As children grow, the digital divide increases the generation gap and makes you a parent feel disconnected. The program helps you understand the online world and its consequences so that you can protect your children and loved ones from potential cybercrimes.
  • Become a better Lawyer: If you are an existing lawyer, you will enhance your cases understandings immensely with this course. This will mean fewer technical mistakes and wider scope of defense.
  • Become a better Police Officer: The program will enhance your ability to connect, speak and discuss with young children and teenagers affected by cybercrimes. You will learn how to remove their fears, give them courage and help you gain crucial details of the case that will fasten the investigations.
  • Become a better Teacher: Being a teacher is a tough job – and when you understand the new age problems of digital kids, it helps you navigate their world without getting lost. With the skills gained in this program, you may be able to intervene just in time before a crime becomes dangerous for the children, causing harm to both the victims and the reputation of the school.
  • Explore Part-time Work Opportunities: The biggest advantage of this program is, this enables you to pick up part-time work opportunities such as:
    • Conducting workshops in schools on cyber safety
    • Working as an Intervention Officer for schools to advise parents and children
    • Assisting lawyers on cyber crime cases
    • Assisting hospitals, counselors and doctors dealing with Cybercrime victims
    You can upgrade your skills to learn Digital Forensics Investigation or become a full time lawyer to enhance full time work opportunities in this area. Both the skills are diverse so do not hesitate to learn more from your Instructors about these skills.
  • Understanding of Basic concepts in information and cyber security.
  • A practical view of the subjects covered
  • Knowledge of Industry-level cyber operations, laws, policies and frameworks.
  • Ability to Identify and respond to security incidents.
  • Skills to assume entry-level positions in Security Operations (Security analyst / JR. Engineer)

Course Topics

Introduction

  • Types of Hackers
  • CIA Triad
  • Hands on Computing
  • Some Basic Terminologies
  • Setting Up your Hacking environment

Networking

  • OSI Model
  • TCP/UDP Model
  • TCP/IP Model
  • Ports and Services such as SSH FTP HTTP HTTPS SMTP
  • Nmap & Nmap Scripts
  • Wireshark
  • Honeypots

Linux Basics and Shell Scripting

  • Basic Linux Commands
  • Linux Booting Process
  • Linux Run Levels
  • Linux File Structure
  • Linux Permissions
  • Basics of Bash Scripting
  • Netcat

Cryptography and Steganography

  • Symmetric Encryption
  • Asymmetric Encryption
  • Hashing
  • SSL TLS
  • Encoding Decoding
  • Steganography and different types
  • Steghide

Password Cracking

  • Wordlists
  • Creating Custom Wordlists using Crunchbase
  • Hydra for Password Cracking
  • John the Ripper
  • Metasploit for SSH password cracking
  • Cyber Chef
  • Rainbow Tables

Malwares and Trojans

  • Different types of Malwares
  • Different Types of Bombs
  • Dos and DDos Attacks
  • MAC Changer
  • Deepweb & Darkweb
  • TOR
  • Onion Websites

System Hacking

  • Introduction to Metasploit
  • Creating payloads using Metasploit
  • Reverse Listeners
  • Linux and Windows Exploits
  • Uploading a Backdoor

Android Hacking

  • Attack Killchain
  • Android Hacking
  • Android Hacking with backdoor

Social Engineering Attacks

  • Different Social Engineering Attacks
  • Phishing and Types with Practical
  • IDN Homograph Attack
  • Email Spoofing
  • ShellPhish
  • Social Engineering Toolkit (SET)

WiFi Hacking

  • Introduction
  • Rogue Access Point
  • WPA2 Cracking

Introduction to Web Pentesting

  • OWASP Top 10
  • 2013 v/s 2017 v/s 2021
  • CVSS
  • Introduction to Bug Bounty
  • Installation of Burp Suite  
  • Basic Authentication Attacks
  • SQL Injection
  • XSS
  • Session Hijacking & Fixation

Information Gathering

  • Google Dorking
  • Tools
  • The Harvester
  • Whois Enumeration
  • DNS Enumeration
  • Black Widow
  • Sherlock
  • Subdomain Enumeration

IoT Search Engines & Reconnaissance

  • Shodan
  • Censys
  • Reverse Whois
  • Waybackurls
  • Github Dorking
  • Tips & Tricks
  • Capstone Project

Learn from Experts

Shifa Cyclewala

Shifa is a web and mobile application developer with a keen interest in cybersecurity field.
/shifa

Rohit Gautam

Rohit is an avid security researcher with special interest in network exploitation and web application security analysis.
/iamrohitg

What is Cyberverse?

Cyberverse Foundation, a Section 8 company, is an organization dedicated to building a robust cybersecurity ecosystem in India.

Bherunda Foundation joined hands to co-found Cyberverse Foundation with Information Sharing and Analysis Centre (ISAC) and Mysore Royal Academy Trust (MYRA). Cyberverse is actively backed by Karnataka Digital Economy Mission (KDEM) and has collaborations at national and international levels. Cyberverse, with its registered corporate office in Mysuru, aims to make Mysuru the chosen cyber security destination.

Why Choose our program ?

Comprised of academia, industry, and thought leaders, Cyberverse provides a holistic approach to learning by not just confining learning not just to the classroom but by encouraging a dynamic, hands-on, experiential, and role-based approach.

Cyberverse understands that learning is lifelong and position agnostic – our host of meticulously designed & curated programs are offered to students, technocrats, government officials, researchers, entrepreneurs, and even leaders.

We also believe that mentorship and guidance have a crucial role to play in enabling individuals in realizing their true potential. Cyberverse is a network of peers, experts, & mentors that help build a solid foundation for a bright future.

Instructor-led,
Live Classes

Access to hands-on experiential learning labs

Easily Accessible and Affordable

Access to encouraging and nurturing community

Enroll Now

Certified Penetration Tester (CPT)

Rs. 59,999+ GST

Certified Bug Bounty Researcher (CBBR)

Rs. 75,000+ GST

Register Now

To know more about the Course

Enroll Now and bag Exciting Early Bird Offers