Basic Diploma Course Content

In this Diploma Course, we provide the best quality Training for beginners in Cyber Security field.

Download SyllabusApply Now


We have 5 Level's of Cyber Security in this Diploma

  • MODULE 1 :- Introduction to Networking
  • MODULE 2 :- Networking Fundamentals
  • MODULE 3 :- OSI Model
  • MODULE 4 :- TCP/IP Model
  • MODULE 5 :- Concept of Layers
  • MODULE 6 :- Lab Configuration
  • MODULE 7 :- Network Devices Fundamentals
  • MODULE 8 :- Internet Protocols
  • MODULE 9 :- Difference between IPv4 & IPv6
  • MODULE 10 :- Subnetting
  • MODULE 11 :- Router Fundamentals
  • MODULE 12 :- Routing Protocols
  • MODULE 13 :- WAN Protocols
  • MODULE 14 :- PPP/ NAT & NAT PAT
  • MODULE 15 :- SSH
  • MODULE 16 :- DHCP
  • MODULE 17 :- BGP

    MODULE 1 :- Introduction to Ethical Hacking

    MODULE 2 :- Kali Linux Hands on Training

    MODULE 3 :- Reconnnaissance

  • Active Foot-Printing
  • Passive Foot-Printing
  • Finger Printing Active/Passive

  • MODULE 4 :- Scanning Networks

  • Host Discovery
  • TCP/UDP Port Scanning
  • Vulnerability Scanning

  • MODULE 5 :- Enumeration

    MODULE 6 :- System Hacking

  • Physical Access (Windows / Linux OS)

  • MODULE 7 :- Malware & Threats

  • Virus / Worms
  • Trojan Horse
  • Ransomware
  • Polymorphic Virus
  • Macro Virus
  • Micro Virus
  • Rootkit, etc.

  • MODULE 8 :- Social Engineering

  • Phishing Attacks
  • Vishing Attack, etc.

  • MODULE 9 :- Denial of Service

  • DOS (Deial of Service)
  • DDOS (Distributed Denial of Service)

  • MODULE 10 :- Session Hijacking

    MODULE 11 :- Wireless Hacking

  • WEP / WPA / WPA2 Wi-Fi Hacking


  • MODULE 12 :- Mobile Hacking

    MODULE 13 :- Hacking Web-Application (with BurpSuite)

    MODULE 14 :- SQL Injection

  • Automatic tool based
  • Manual SQL Injection

  • MODULE 15 :- Hacking Web Server

    MODULE 16 :- Sniffing / Sniffers

  • MITM Attack
  • DNS Attack
  • DHCP Attack
  • MAC Address Attack, etc.

  • MODULE 17 :- IDS, Firewall, Honeypot

    MODULE 18 :- Cryptography

    MODULE 19 :- Basics of Cloud Computing / Hacking

    MODULE 20 :- IoT Hacking

    MODULE 21 :- Basics of Penetration Testing

    MODULE 1 :- How to plan your Penetration Testing

    MODULE 2 :- Scoping your Penetration Testing

    MODULE 3 :- Network & Web-Application

    MODULE 4 :- Scanning Vulnerability

  • Port Scanning
  • Script scanning
  • Enumeration
  • Service & Version Scanning
  • Web-Application Scanning

  • MODULE 5 :- Exploitation with Metasploit

  • Exploit Vulnerability
  • Bind & Reverse Shell
  • Payload Creation, etc.

  • MODULE 6 :- Post-Exploitation

    MODULE 7 :- Pivoting Attack

    MODULE 8 :- Browser exploitation

  • BEEF Exploit

  • MODULE 9 :- Denial of Service

  • DOS (Deial of Service)
  • DDOS (Distributed Denial of Service)

  • MODULE 10 :- In-Depth Password Attacks

  • John the Ripper
  • Brute Force Attack
  • Dictionary Attack
  • Rainbow Table Attack
  • Other Password Cracking Tools

  • MODULE 11 :- Crcking / Solving CTF's

    MODULE 12 :- Final Analysis

    MODULE 13 :- Final Report Generation

  • Manual Reporting
  • Automatic Reporting
  • MODULE 1 :- Introduction to Web-application Penetration-Testing
  • MODULE 2 :- Finding Subdomains
  • MODULE 3 :- Understanding HTTP
  • MODULE 4 :- Access Control Flaws
  • MODULE 5 :- Ajax Security
  • MODULE 6 :- Authentication Flaws
  • MODULE 7 :- Buffer overflaws
  • MODULE 8 :- Code Quality
  • MODULE 9 :- Concurrency Flaws
  • MODULE 10 :- Cross Site Scripting
  • MODULE 11 :- Improper Error Handling
  • MODULE 12 :- Injection Flaws
  • MODULE 13 :- Denail of Service
  • MODULE 14 :- Insecure Communication
  • MODULE 15 :- Insecure Configuration
  • MODULE 16 :- Insecure Storage
  • MODULE 17 :- Malicious File Execution
  • MODULE 18 :- Parameter Tampering
  • MODULE 19 :- Session Management Flaws
  • MODULE 20 :- Challenge Online Platform
  • MODULE 1 :- Android Fundamentals
  • MODULE 2 :- Improper Platform usage
  • MODULE 3 :- Insecure Data Storage
  • MODULE 4 :- Insecure Communication
  • MODULE 5 :- Insecure Authentication
  • MODULE 6 :- Insecure Authorization
  • MODULE 7 :- Client Code quality
  • MODULE 8 :- Trojan & Backdoor
  • MODULE 9 :- Code Tampering
  • MODULE 10 :- Reverse Engineering
  • MODULE 11 :- Live Application Testing
  • MODULE 12 :- Testing with Burp Suite
  • MODULE 13 :- Testing Application on Genymotion
  • Duration 6 Months
  • 200 GB Toolkit
  • Online & Offline Classes Available
  • Each Level Certificate
  • One All Level Diploma Certificate
  • 3 Months Internship Certificate Available
  • Interview Preparation
  • 100% Job Placement after Internship
  • Training by experienced trainners
  • Can Ask Direct questions and can resolve techincal questions with trainners
  • Standard classes, Group challenges , review sessions
  • 1 year Membership at Recon Force Training
  • Certificate After Training
  • Standard Study Environment
  • Best Training Environment
  • Checkpoint based training
  • Live Hacking
  • High speed internet.

Download SyllabusApply Now