Check Our Best Diploma courses in Cyber Security

6 Months Diploma in Cyber Security

This VAPT diploma is an essential process for any organization that wants to protect its data and systems from cyber threats.


Master Diploma in Cyber Security

This is a great way to advance your career in cybersecurity and gain recognition as a skilled and knowledgeable professional.


Python Programming

Python is a great language to start with due to its beginner-friendly syntax and vast community support.


Bug Hunting

If you enjoy solving puzzles and have a keen eye for detail, bug hunting can be a fun and rewarding experience.


Cyber Security Diploma in Delhi

Recon Cyber Security provided best accredited Cyber Security Diploma in India that offers the best Cyber Security Diploma in India on practical exams that help aspirants gain professional skills. The institute offers practical and career-based Cyber Security Diploma in Delhi to help students find their dream job at various MNCs. Students are given the opportunity to gain practical experience of participating in real Cyber Security projects and 100% placement assistance. The Recon Cyber Security Cyber Security Diploma in India is run under the highly experienced industry professionals. It is recognized among the leading Cyber Security Diploma in india, as it operates on a mix of practical learning and learning theory. This type of comprehensive behavioral training with good exposure facilitates the complete transition of the student into a professional.

  • Carrer Scope : Opportunity in following Domain
  • Security Analyst | Penetration Tester | Security Consultant
  • Security Architect | Chief Information Security Officer (CISO) | Forensic Analyst

Included Services

  • 100% Placement Assistance
  • 1,2,4 Hour Batches
  • 500 GB Hacking Toolkit
  • 1 Year Course Duration

Benifits of services

  • 2 Year Membership
  • Hindi or English Language
  • Online and Offline Training
  • 7+ Year Experience Trainer

1 Year Cyber Security Diploma course syllabus

Course 1 : Advanced Networking
17 Lectures - 1 Month
πŸ”Ά Introduction to Networking
      β€’ what is networking
πŸ”Ά Fundamentals of Networking
πŸ”Ά OSI Model v/s TCP/IP Model
πŸ”Ά MAC Address
πŸ”Ά IP Addressing
      β€’ IPv4
      β€’ IPv6
πŸ”Ά Subnetting
πŸ”Ά Network Cabling
πŸ”Ά Router Fundamentals
πŸ”Ά Lab Configuration on Packet Tracer
πŸ”Ά Router, Switch and PC Communication
πŸ”Ά Routing Protocols
      β€’ Default Routing
      β€’ Static Routing
      β€’ Static Routing with Subnetting
πŸ”Ά Dynamic Routing
      β€’ RIP
      β€’ EIGRP
      β€’ OSPF
πŸ”Ά NAT (Network Address Translation)
πŸ”Ά V-LAN Configuration
πŸ”Ά ACL (Access Control List)
πŸ”Ά BGP Configuration
🟒 Online / Offline Training
🟒 Live Practical training
🟒 Training by experienced trainers
🟒 Checkpoint based training
🟒 Every session Recordings
🟒 Test After completion
🟒 24x7 Support
Download PDF
Course 2 : Linux Essentials
09 Lectures - 2 Week
πŸ”Ά Linux Evolution and Popular Operating Systems
      β€’ Introduction
      β€’ Linux Distribution
      β€’ Linux Embedded System
      β€’ Hardware Requirement
      β€’ Installing Linux
      β€’ OS Differences
πŸ”Ά Open Software Application
      β€’ What is an Open Source
      β€’ Desktop and Server Application
      β€’ Languages and Tools
      β€’ Packages installs and repositories
πŸ”Ά The Linux Environments
      β€’ Linux Desktop Environments
      β€’ Linux Shell and Commands
      β€’ Managing Softares Packages
πŸ”Ά The Command Line
      β€’ Difference B/w Shells
      β€’ Command Line
      β€’ Command Usage
      β€’ Man Pages
πŸ”Ά Directories And Files
πŸ”Ά Searching and extracting data from files
πŸ”Ά Packages Installation in Different Directory
πŸ”Ά User Account and Groups
      β€’ Creating Account from the Shell
      β€’ Modifying and Deleting Account
      β€’ Working as Root
πŸ”Ά Managing file ownership and Permission
🟒 Online / Offline Training
🟒 Live Practical training
🟒 Training by experienced trainers
🟒 Checkpoint based training
🟒 Every session Recordings
🟒 Test After completion
🟒 24x7 Support
Download PDF
Course 3 : Ethical Hacking
20 Lectures - 2 Months
πŸ”Ά Introduction to Ethical Hacking
πŸ”Ά Reconnnaissance
      β€’ Active Foot-Printing
      β€’ Passive Foot-Printing
      β€’ Finger Printing Active/Passive

πŸ”Ά Scanning Networks
      β€’ Host Discovery
      β€’ TCP/UDP Port Scanning
      β€’ Vulnerability Scanning

πŸ”Ά Enumeration
πŸ”Ά System Hacking
      β€’ Physical Access (Windows / Linux OS)

πŸ”Ά Malware & Threats
      β€’ Virus / Worms
      β€’ Trojan Horse
      β€’ Ransomware
      β€’ Polymorphic Virus
      β€’ Macro Virus
      β€’ Micro Virus
      β€’ Rootkit, etc.
πŸ”Ά Social Engineering
      β€’ Phishing Attacks
      β€’ Vishing Attack, etc.

πŸ”Ά Denial of Service
      β€’ DOS (Deial of Service)
      β€’ DDOS (Distributed Denial of Service)

πŸ”Ά Session Hijacking
πŸ”Ά Wireless Hacking
      β€’ WEP / WPA / WPA2 Wi-Fi Hacking

πŸ”Ά Mobile Hacking
πŸ”Ά Hacking Web-Application (with BurpSuite)
πŸ”Ά SQL Injection
      β€’ Automatic tool based
      β€’ Manual SQL Injection

πŸ”Ά Hacking Web Server
πŸ”Ά Sniffing / Sniffers
      β€’ MITM Attack
      β€’ DNS Attack
      β€’ DHCP Attack
      β€’ MAC Address Attack, etc.

πŸ”Ά IDS, Firewall, Honeypot
πŸ”Ά Cryptography
πŸ”Ά Basics of Cloud Computing / Hacking
πŸ”Ά IoT Hacking
πŸ”Ά Basics of Penetration Testing

🟒 Online / Offline Training
🟒 Live Practical training
🟒 Interview Questions
🟒 Test After completion
Download PDF
Course 4 : Python Programming
19 Lectures - 2 Month
πŸ”Ά Introduction to Python
πŸ”Ά Environment Setup
πŸ”Ά Basic Syntax
πŸ”Ά Comments
πŸ”Ά Variables
πŸ”Ά Data Types
πŸ”Ά Operators
πŸ”Ά Division Making
πŸ”Ά Loops
πŸ”Ά Numbers
πŸ”Ά Strings
πŸ”Ά Lists
πŸ”Ά Tuples
πŸ”Ά Dictionary
πŸ”Ά Date & Time
πŸ”Ά Function
πŸ”Ά Modules
πŸ”Ά Files I/O
πŸ”Ά Exceptions
🟒 Online / Offline Training
🟒 Live Practical training
🟒 Training by experienced trainers
🟒 Checkpoint based training
🟒 Every session Recordings
🟒 Test After completion
🟒 24x7 Support
Download PDF
Course 5 : Network Penetration Testing
13 Lectures - 1 Months
πŸ”Ά How to plan your Penetration Testing
πŸ”Ά Scoping your Penetration Testing
πŸ”Ά Network & Web-Application
πŸ”Ά Scanning Vulnerability
      β€’ Port Scanning
      β€’ Script scanning
      β€’ Enumeration
      β€’ Service & Version Scanning
      β€’ Web-Application Scanning

πŸ”Ά Exploitation with Metasploit
      β€’ Exploit Vulnerability
      β€’ Bind & Reverse Shell
      β€’ Payload Creation, etc.

πŸ”Ά Post-Exploitation
πŸ”Ά Pivoting Attack
πŸ”Ά Browser exploitation
      β€’ BEEF Exploit

πŸ”Ά In-Depth Password Attacks
      β€’ John the Ripper
      β€’ Brute Force Attack
      β€’ Dictionary Attack
      β€’ Rainbow Table Attack
      β€’ Other Password Cracking Tools

πŸ”Ά Crcking / Solving CTF's
πŸ”Ά Final Analysis
πŸ”Ά Final Report Generation
      β€’ Manual Reporting
      β€’ Automatic Reporting
🟒 Online / Offline Training
🟒 Live Practical training
🟒 Interview Questions
🟒 Test After completion
Download PDF
Course 6 : Web Application Pen-Testing
20 Lectures - 1 Month
πŸ”Ά Introduction to Web-application Penetration-Testing
πŸ”Ά Finding Subdomains
πŸ”Ά Understanding HTTP
πŸ”Ά Access Control Flaws
πŸ”Ά Ajax Security
πŸ”Ά Authentication Flaws
πŸ”Ά Buffer overflaws
πŸ”Ά Code Quality
πŸ”Ά Concurrency Flaws
πŸ”Ά Cross Site Scripting
πŸ”Ά Improper Error Handling
πŸ”Ά Injection Flaws
πŸ”Ά Denail of Service
πŸ”Ά Insecure Communication
πŸ”Ά Insecure Configuration
πŸ”Ά Insecure Storage
πŸ”Ά Malicious File Execution
πŸ”Ά Parameter Tampering
πŸ”Ά Session Management Flaws
πŸ”Ά Challenge Online Platform
🟒 Online / Offline Training
🟒 Live Practical training
🟒 Interview Questions
🟒 Test After completion
Download PDF
Course 7 : Mobile-App Penetration Testing
22 Lectures - 1 Month
πŸ”Ά Android Fundamentals
πŸ”Ά Introduction to Mobile-App Testing
πŸ”Ά Lab Setup
πŸ”Ά Android Architecture
πŸ”Ά APK File Structure
πŸ”Ά Reversing with APK tool / JADx-GUI
πŸ”Ά Reversing with MobSF
πŸ”Ά Static Analysis
πŸ”Ά Scanning Vulnerabilities with Drozer
πŸ”Ά Improper Platform Usage
πŸ”Ά Log Analysis
πŸ”Ά Insecure Storage
πŸ”Ά Insecure Communication
πŸ”Ά Hard Coding Issues
πŸ”Ά Insecure Authentication
πŸ”Ά Insufficient Cryptography
πŸ”Ά Code Tempering
πŸ”Ά Extraneous Functionality
πŸ”Ά SSL Pinning Attack
πŸ”Ά Intercepting The Network Traffic
πŸ”Ά Dynamic Analysis
πŸ”Ά Report Preparation
🟒 Online / Offline Training
🟒 Live Practical training
🟒 Interview Questions
🟒 Test After completion
Download PDF
Course 8 : Apple IOS Application Pen-Testing
22 Lectures - 1 Month
πŸ”Ά Introduction
πŸ”Ά Introduction to IOS Apps
πŸ”Ά Challenges with IOS lab setup
πŸ”Ά Lab setup with jailbreaken IOS device
πŸ”Ά Setting up XCODE
πŸ”Ά Installing Apps in IOS device
πŸ”Ά Decrypting IOS applications
πŸ”Ά Introduction to SecureStorev2
πŸ”Ά Dumpping class information
πŸ”Ά Jailbreak detection bypass
πŸ”Ά IOS Traffic analysis
πŸ”Ά Introduction to Frida / Frida CLI
πŸ”Ά Frida Scripts to trace HTTP calls
πŸ”Ά Introduction to end-to-end Encryption
πŸ”Ά Introduction to hopper
πŸ”Ά Jailbreak detection using hopper
πŸ”Ά SSL pinning attack
πŸ”Ά Pentesting Local Data storage
πŸ”Ά Pentesting Uninteded Data Leakage
πŸ”Ά Pentesting client side injection
πŸ”Ά Traffic Analysis
πŸ”Ά RunTime Analysis
πŸ”Ά Network Attacks
πŸ”Ά Reporting
🟒 Online / Offline Training
🟒 Live Practical training
🟒 Interview Questions
🟒 Test After completion
Download PDF
Course 9 : Bug Hunting
63 Lectures - 2 Months
πŸ”Ά Introduction
πŸ”Ά Information Gathering
πŸ”Ά BurpSuite Introduction
πŸ”Ά Cross Site Scripting (XSS)
πŸ”Ά Host Header Injection
πŸ”Ά URL Redirection
πŸ”Ά Parameter Tempering
πŸ”Ά HTML Injection
πŸ”Ά SQL Injection
πŸ”Ά File Inclusion
πŸ”Ά Missing SPF Record
πŸ”Ά No rate limiting
πŸ”Ά Source Code Discloser
πŸ”Ά Long Password Dos Attack
πŸ”Ά Server Site Request Forgery (SSRF)
πŸ”Ά Cross Site Request Forgery (CSRF)
πŸ”Ά Hostile Subdomain Takeover
πŸ”Ά S3 Bucket Takeover
πŸ”Ά Command Injection (RCE)
πŸ”Ά File Uploading
πŸ”Ά XML External Entity Injection
πŸ”Ά Buffer Overflow
πŸ”Ά Wordpress Vulnerability
πŸ”Ά Joomla Vulnerability
πŸ”Ά Drupal Vulnerability
πŸ”Ά CMS Vulnerability Hunting
πŸ”Ά HSTS (HTTP Strict transport Security)
πŸ”Ά Session Fixation
πŸ”Ά Account Lookout
πŸ”Ά Password Reset Poisoning
πŸ”Ά Identity management test Testing
πŸ”Ά Authentication Testing
πŸ”Ά Cryptographic Vulnerability
πŸ”Ά Session Mangement Testing
πŸ”Ά Exposed Source Code Control System
πŸ”Ά Apache Structs RCE Hunting
πŸ”Ά Web Cache Deceptions
πŸ”Ά Server Side Includes injection
πŸ”Ά Ticket Tricks Bug Bounty
πŸ”Ά Multi-Factor Authentication
πŸ”Ά HTTPoxy Attack
πŸ”Ά Webmin Unauthentication bypass
πŸ”Ά HeartBleed
πŸ”Ά Appweb Authentication Bypass
πŸ”Ά Ngnix
πŸ”Ά MySQL Authentication Bypass
πŸ”Ά DMS Zone Transfer
πŸ”Ά Log Injection
πŸ”Ά Cache Testing
πŸ”Ά Black (Jinga-2) SSTI to RCE
πŸ”Ά Handloop Vulnerability
πŸ”Ά CSRF Same site bypass
πŸ”Ά JWT Token Attack
πŸ”Ά Email bounce resource
πŸ”Ά IVR Call Request Crash
πŸ”Ά Weak Password Reset
πŸ”Ά Business Login Vulnerabilities
πŸ”Ά RPC Ping Back Attack
πŸ”Ά WAF/ MOD Security Bypass
πŸ”Ά Broken Authentication
πŸ”Ά Open redirection
πŸ”Ά Null Byte Injection
πŸ”Ά CORS Vulnerabilities

🟒 Online / Offline Training
🟒 Live Practical training
🟒 Interview Questions
🟒 Test After completion
Download PDF
Course 10 : API-Testing
22 Lectures - 1 Month
πŸ”Ά introduction to API
πŸ”Ά Postman Lab setup
πŸ”Ά Preparation for API Pen-Testing
πŸ”Ά Lab Setup
πŸ”Ά SQL injection
πŸ”Ά Command Injection
πŸ”Ά Offensive XXE Exploitation
πŸ”Ά Server Side Request Forgery
πŸ”Ά Cross site scripting
πŸ”Ά Transport layer security issues
πŸ”Ά Mass Assignment attack
πŸ”Ά Broken Object Level Authorization Issues
πŸ”Ά File Path Traversal
πŸ”Ά User Enumeration
πŸ”Ά Information Disclosure
πŸ”Ά JSON web token
πŸ”Ά Unauthorized password change
πŸ”Ά Excessive data exposure
πŸ”Ά Lack of Resource & Rate Limiting
πŸ”Ά Regular Expression DOS attack
πŸ”Ά BFLA Issues
πŸ”Ά Billion laugh attack
πŸ”Ά Hidden API Functionality Exposure
πŸ”Ά RCE Via Deserilization in API
🟒 Online / Offline Training
🟒 Live Practical training
🟒 Interview Questions
🟒 Test After completion
Download PDF
Course 11 : Malware Analysis
22 Lectures - 1 Month
πŸ”Ά Introduction to Malware Analysis
πŸ”Ά Basic Of Analysis
πŸ”Ά Advanced Static Analysis
πŸ”Ά Analysing Windows Programs
πŸ”Ά Advanced Dynamic Analysis
πŸ”Ά Malware Behaviour
πŸ”Ά Data Encoding and Malware Countermeasures
πŸ”Ά Covert Malware Launching
πŸ”Ά Antianalysis
πŸ”Ά Packing and Unpacking
πŸ”Ά Rootkit Techniques
🟒 Online / Offline Training
🟒 Live Practical training
🟒 Interview Questions
🟒 Test After completion
Download PDF
Course 12 : CTF Challenge
19 Lectures - 2.5 Months
πŸ”Ά Introduction
      β€’ Finding Files
      β€’ Services in Kali SSH Service
      β€’ FTP Services
      β€’ HTTP Service
      β€’ Mysql Services
      β€’ Service Management
πŸ”Ά Basic Linux and Commands
      β€’ Locate
      β€’ Which
      β€’ Find
      β€’ Sed
      β€’ Awk
      β€’ Cut
      β€’ Sort
      β€’ Grep
      β€’ Head
      β€’ Tail
      β€’ Wget
      β€’ Cat
πŸ”Ά Netcat Tutorials
      β€’ Getting start with NC
      β€’ Connecting to a Server
      β€’ Fetching HTTP header
      β€’ Chatting
      β€’ Creating a Backdoor
      β€’ Verbose Mode
      β€’ Save Output to Disk
πŸ”Ά Port Scanning
      β€’ TCP Delay Scan
      β€’ UDP Scan
      β€’ Reverse TCP Shell Exploitation
      β€’ Randomize Port
      β€’ File Transfer
      β€’ Reverse Netcat Shell Exploitation
      β€’ Banner grabbing
      β€’ Port Scanning With Nmap & Wireshark
      β€’ TCP Connect Scan with wireshark
      β€’ Network Sweeping with wireshark
      β€’ SYN Scan with wireshark
      β€’ UDP Scan with wireshark
      β€’ FIN Scan with wireshark
      β€’ Null Scan with wireshark
      β€’ OS Discovery with wireshark
      β€’ NSE Scripts with wireshark
      β€’ Nmap Firewall Scan
πŸ”Ά Enumeration
      β€’ Overview
      β€’ DNS Enumeration
      β€’ Forward DNS Lookup
      β€’ Reverse DNS Lookup
      β€’ Zone Transfers
      β€’ NetBIOS & SMB Enumeration
      β€’ Null Sessions
      β€’ Enum4Linux
      β€’ SMB NSE Scripts
      β€’ MSQL Enumeration
      β€’ MSSQL Enumeration
      β€’ SMTP Enumeration
      β€’ VRFY Script
      β€’ Python Port
      β€’ SNMP Enumeration
      β€’ SNMP MiB
      β€’ SNMPWalk
πŸ”Ά Passive Info Gathering
      β€’ Overview
      β€’ Google Search
      β€’ Google Hacking
      β€’ GHDB
      β€’ Directory Bruteforce Attack
      β€’ Dirb
      β€’ Dirbuster
      β€’ Dirsearch
      β€’ Metasploit
πŸ”Ά Reverse Shell
      β€’ Php reverse shell
      β€’ Python reverse shell
      β€’ Perl reverse shell
      β€’ Bash reverse shell
      β€’ Msfvenom shell
πŸ”Ά Intro to Overflows
      β€’ Overview
      β€’ Vulnerable Code
      β€’ Stack Overflow
πŸ”Ά Windows BO Example
      β€’ Overview
      β€’ Fuzzing
      β€’ Crash Replication
      β€’ Controlling EIP
      β€’ Introducing Shellcode
      β€’ Bad Characters
      β€’ Redirecting Execution
      β€’ Introducing Mona
      β€’ Shellcode Payload
πŸ”Ά Linux BO Example
      β€’ Controlling EIP
      β€’ Locating Space
      β€’ First Stage Shellcode
      β€’ Locating RET
      β€’ Generating Shellcod
πŸ”Ά Using Public Exploits
      β€’ Overview
      β€’ Finding Exploits
      β€’ Exploit – DB
      β€’ Fixing Exploits 1
      β€’ Fixing Exploits 2
      β€’ Cross – Compiling
πŸ”Ά File Transfers
      β€’ Python HTTP Server
      β€’ php http server
      β€’ HFS Tool
      β€’ Netcat
      β€’ CURL
      β€’ SMB Server
      β€’ Powershell File Transfer
      β€’ Bitsadmin
      β€’ Wget
      β€’ TFTP
      β€’ Python
πŸ”Ά Linux Privilege Escalation
      β€’ Suid Binaries
      β€’ Absuing Sudo β€˜ s Right
      β€’ Kernel Exploit
      β€’ Path Variables
      β€’ Multiple Ways to edit / etc / passwd fill
      β€’ Windows Privilege Escalation
      β€’ Weak File Permissions
      β€’ Always Install Elevated
      β€’ Bypass UAC
      β€’ Kernel Exploits
πŸ”Ά Web Application Attacks

      β€’ Authentication Bypass
      β€’ Error Based Enum
      β€’ Blind SQL Injection
      β€’ Attack Proxies
      β€’ SQLMap
πŸ”Ά Password Cracking
      β€’ Overview
      β€’ Crunch
      β€’ Passing the Hash
      β€’ Password Profiling
      β€’ Online Attacks
      β€’ Medusa
      β€’ Ncrack
      β€’ Hydra
      β€’ Password Hashes
      β€’ Cracking Hashes
      β€’ LM / NTLM
πŸ”Ά Port Fun
      β€’ Overview
      β€’ Port Forwarding
      β€’ SSH Tunnels
      β€’ Dynamic Proxies
      β€’ Proxy Chains
πŸ”Ά Metasploit Framework
      β€’ Overview
      β€’ AUX Modules
      β€’ SNMP Modules
      β€’ SMB Modules
      β€’ WEBDAV Modules
      β€’ Database Services
      β€’ Exploits
      β€’ Payloads
      β€’ Meterpreter
      β€’ Meterpreter in Action
      β€’ Additional Payloads
      β€’ Binary Payloads
      β€’ Multihandler
      β€’ Porting Exploits
      β€’ Post Exploitation
πŸ”Ά Antivirus Avoidance
      β€’ Overview
      β€’ Shellter
      β€’ Veil – Evasion
      β€’ thefatrat

🟒 Online / Offline Training
🟒 Live Practical training
🟒 Interview Questions
🟒 Test After completion
Download PDF

Our Free Services

Blogs and News

You can read about the latest updates and tools for Cyber Security.

Learning Videos and Tutorials

You can read and watch the free videos about cyber security.


How do I Enroll or Register?
It's very simple, Just follow these 3 Steps.


STEP - 1

Call or Send us Message


STEP - 2

Discuss With Us
and take a free DEMO Session


STEP - 3

Send a Registration Fee


Master diploma in cyber security

Frequently Asked Questions about Cyber Security

Cybersecurity is the practise that prevents unauthorized access, theft, damage, and delay to computer systems, networks, and digital information.

You can begin by earning a degree in computer science, information technology, or a similar field to enter into cyber security. You can also gain relevant certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), and Certified Ethical Hacker (CEH). Additionally, gaining hands-on experience through internships, volunteering, or participating in cyber security competitions can be helpful.

Due to the technical knowledge, skills, and continual learning required to stay up with new risks and technology, cyber security can be difficult.

According to the work, amount of expertise, and location, salaries for cyber security positions range. The median salary for a cyber security analyst in the US is $76,775 according to Payscale.

Cybersecurity guards against online dangers like hacking, malware, phishing, and hacking for computer systems, networks, and digital data.

Yes, cyber security can be a rewarding career as there is high demand for skilled professionals and opportunities for career advancement.

The job, level of experience, and location all affect a cyber security professional's pay. The average yearly pay for a cyber security analyst in the US is $76,410, according to Google.

Meet our placed Students in companies

Join Best Cyber Security courses in Delhi

  • The organization is best known for the Cyber Security courses in Delhi
  • Cyber Security Courses in Delhi is constructed as per the IT industry standard.
  • 100% Placement support by Recon Cyber Security.
  • One year membership of Recon Cyber Security(One of the leading Cyber Security training Institute in Delhi).
  • Free study materials video training, PDF's, Interview Questions(HR and Technical).
  • One of the biggest team of Certified Cyber Security Expert.
  • Post training support.

From the blog

Latest News & Articles

Call Us