Beginner Cyber Security Diploma

Join Best Cyber Security Diploma and 6 Month Cyber Security Diploma

Recon Cyber Security provided best accredited Beginner Cyber Security Diploma Course that offers the best Beginner Cyber Security Diploma Course on practical exams that help aspirants gain professional skills. The institute offers practical and career-based Beginner Cyber Security Diploma Course to help students find their dream job at various MNCs. Students are given the opportunity to gain practical experience of participating in real Cyber Security projects and 100% placement assistance. The Recon Cyber Security Beginner Cyber Security Diploma is run under the highly experienced industry professionals. It is recognized among the leading Cyber Security Diploma in india, as it operates on a mix of practical learning and learning theory. This type of comprehensive behavioral training with good exposure facilitates the complete transition of the student into a professional.

Recon Cyber Security is one of India's best and most well-known training center with high-tech infrastructure. The institute offers best Cyber Security training that is customized according to the content requirement of each and every student.Recon Cyber Security is the credible and one of the Best Cyber Security Training institutes in india along with 100% placement support. Post completion of the training the students are awarded Recon Cyber Security certification that is widely recognized in the industry is a validation of one's skills and expertise.

Course Content and Syllabus for Beginner Cyber Security Diploma

Recon Beginner Cyber Security Diploma Course content fulfills the requirement of both basic as well as advanced level Cyber Security Diploma training.The Recon Cyber Security Diploma is designed based on industry recommendations and student needs.Recon is the best Beginner Cyber Security Diploma training center in Delhi. Recon Best Beginner Cyber Security Diploma syllabus includes Advance Networking , Ethical Hacking, Penetration Testing, Web-Application Penetration Testing, Mobile Application Penetration Testing.

    MODULE 1 :- Introduction to Networking

    MODULE 2 :- Networking Fundamentals

    MODULE 3 :- OSI Model

    MODULE 4 :- TCP/IP Model

    MODULE 5 :- Concept of Layers

    MODULE 6 :- Lab Configuration

    MODULE 7 :- Network Devices Fundamentals

    MODULE 8 :- Internet Protocols

    MODULE 9 :- Difference between IPv4 & IPv6

    MODULE 10 :- Subnetting

    MODULE 11 :- Router Fundamentals

    MODULE 12 :- Routing Protocols

    MODULE 13 :- WAN Protocols

    MODULE 14 :- PPP/ NAT & NAT PAT

    MODULE 15 :- SSH

    MODULE 16 :- DHCP

    MODULE 17 :- BGP

    MODULE 1 :- Introduction to Ethical Hacking

    MODULE 2 :- Kali Linux Hands on Training

    MODULE 3 :- Reconnnaissance

  • Active Foot-Printing
  • Passive Foot-Printing
  • Finger Printing Active/Passive

  • MODULE 4 :- Scanning Networks

  • Host Discovery
  • TCP/UDP Port Scanning
  • Vulnerability Scanning

  • MODULE 5 :- Enumeration

    MODULE 6 :- System Hacking

  • Physical Access (Windows / Linux OS)

  • MODULE 7 :- Malware & Threats

  • Virus / Worms
  • Trojan Horse
  • Ransomware
  • Polymorphic Virus
  • Macro Virus
  • Micro Virus
  • Rootkit, etc.

  • MODULE 8 :- Social Engineering

  • Phishing Attacks
  • Vishing Attack, etc.

  • MODULE 9 :- Denial of Service

  • DOS (Deial of Service)
  • DDOS (Distributed Denial of Service)

  • MODULE 10 :- Session Hijacking

    MODULE 11 :- Wireless Hacking

  • WEP / WPA / WPA2 Wi-Fi Hacking


  • MODULE 12 :- Mobile Hacking

    MODULE 13 :- Hacking Web-Application (with BurpSuite)

    MODULE 14 :- SQL Injection

  • Automatic tool based
  • Manual SQL Injection

  • MODULE 15 :- Hacking Web Server

    MODULE 16 :- Sniffing / Sniffers

  • MITM Attack
  • DNS Attack
  • DHCP Attack
  • MAC Address Attack, etc.

  • MODULE 17 :- IDS, Firewall, Honeypot

    MODULE 18 :- Cryptography

    MODULE 19 :- Basics of Cloud Computing / Hacking

    MODULE 20 :- IoT Hacking

    MODULE 21 :- Basics of Penetration Testing

    MODULE 1 :- How to plan your Penetration Testing

    MODULE 2 :- Scoping your Penetration Testing

    MODULE 3 :- Network & Web-Application

    MODULE 4 :- Scanning Vulnerability

  • Port Scanning
  • Script scanning
  • Enumeration
  • Service & Version Scanning
  • Web-Application Scanning

  • MODULE 5 :- Exploitation with Metasploit

  • Exploit Vulnerability
  • Bind & Reverse Shell
  • Payload Creation, etc.

  • MODULE 6 :- Post-Exploitation

    MODULE 7 :- Pivoting Attack

    MODULE 8 :- Browser exploitation

  • BEEF Exploit

  • MODULE 9 :- Denial of Service

  • DOS (Deial of Service)
  • DDOS (Distributed Denial of Service)

  • MODULE 10 :- In-Depth Password Attacks

  • John the Ripper
  • Brute Force Attack
  • Dictionary Attack
  • Rainbow Table Attack
  • Other Password Cracking Tools

  • MODULE 11 :- Crcking / Solving CTF's

    MODULE 12 :- Final Analysis

    MODULE 13 :- Final Report Generation

  • Manual Reporting
  • Automatic Reporting
    MODULE 1 :- Introduction to Web-application Penetration-Testing

    MODULE 2 :- Finding Subdomains

    MODULE 3 :- Understanding HTTP

    MODULE 4 :- Access Control Flaws

    MODULE 5 :- Ajax Security

    MODULE 6 :- Authentication Flaws

    MODULE 7 :- Buffer overflaws

    MODULE 8 :- Code Quality

    MODULE 9 :- Concurrency Flaws

    MODULE 10 :- Cross Site Scripting

    MODULE 11 :- Improper Error Handling

    MODULE 12 :- Injection Flaws

    MODULE 13 :- Denail of Service

    MODULE 14 :- Insecure Communication

    MODULE 15 :- Insecure Configuration

    MODULE 16 :- Insecure Storage

    MODULE 17 :- Malicious File Execution

    MODULE 18 :- Parameter Tampering

    MODULE 19 :- Session Management Flaws

    MODULE 20 :- Challenge Online Platform
    MODULE 1 :- Android Fundamentals

    MODULE 2 :- Improper Platform usage

    MODULE 3 :- Insecure Data Storage

    MODULE 4 :- Insecure Communication

    MODULE 5 :- Insecure Authentication

    MODULE 6 :- Insecure Authorization

    MODULE 7 :- Client Code quality

    MODULE 8 :- Trojan & Backdoor

    MODULE 9 :- Code Tampering

    MODULE 10 :- Reverse Engineering

    MODULE 11 :- Live Application Testing

    MODULE 12 :- Testing with Burp Suite

    MODULE 13 :- Testing Application on Genymotion

Download SyllabusApply Now

Course Duration

6 Months

Including Internship

Course Fees

30 % off

(Offer valid till 31th October 2020)



Book Now