KaaShiv's Training Program will provide you with in-depth knowledge in Cyber security
5 of (8k+ satisfied learners)
Most popular course on Cyber security trusted by over 50,000 students! Built with years of experience by industry experts and gives you a complete package of video lectures, practice problems, quizzes. Start Today!
Available for 5 Days to
SignIn to BuyCyber security Internship excellent to learn
Get Job from Top Companies with this Internship
Average Salary
Rs.5,00,000 - 8,00,000 / Year
Topic | Text Material | Image content | Video content | Quiz |
---|---|---|---|---|
Cyber Security Syllabus | - | |||
Cyber Security Introduction | - | |||
Types of Cyber Threats | - | |||
Types of Hackers | - | |||
Famous Hackers cyber security | - | |||
How Client Server Works | - | |||
Client files and Server files | - | |||
How Client files and Server files are placed | - | |||
Cyber Security Live Class Day 1 | 1 video | |||
Role of Cyber Security Professionals | - | |||
Role of Ethical hackers | - | |||
Skills for Cyber Security Engineers | - | |||
Introduction to CCNA | - | |||
Cyber Security Principles | - | |||
Role of Cyber Security in our life | - | |||
Practical Implementation of Website Cloning | - | |||
Data Recovery Techniques | - |
Topic | Text Material | Image content | Video content | Quiz |
---|---|---|---|---|
Environmental Setup cyber security | - | |||
Basic of Network | - | |||
Purpose behind Hacking | - | |||
Hacking Procedures followed by Hackers | - | |||
Data Breach Introduction | - | |||
Pretty Good Privacy | - | |||
Cyber Security Live Class Day 2 | 1 video | |||
Malwares | - | |||
Adware | - | |||
Malware Properties | - | |||
How Malwares Spreads | - |
Topic | Text Material | Image content | Video content | Quiz |
---|---|---|---|---|
Cyber Security Incidents | - | |||
Social Engineering in Cyber Security | - | |||
Phishing Attack in Social Engieering | - | |||
Types of Phishing | - | |||
Trojan Horses in Cyber Security | - |
Topic | Text Material | Image content | Video content | Quiz |
---|---|---|---|---|
Pre-connection Attack | - | |||
Network Penetration Testing | - | |||
Computer Security | - | |||
Top 10 Intelligence agencies of the World | - | |||
Domain Name System | - | |||
About airodump - ng | - | |||
Wireless Interface in Monitor Mode | - | |||
Network Protocol-cyber security | - | |||
Proxy Server cyber security | - | |||
Run airodump - ng | - | |||
Complete reference on Cyber Security | - | |||
Process of Reverse Engineering | - | |||
Malware Analysis Tools | - | |||
Threat Intelligence | - | |||
Cyber Crime in India | - | |||
Cyber Security Live Class Day 3 | - |
Topic | Text Material | Image content | Video content | Quiz |
---|---|---|---|---|
Hacking Tools cyber security | - | |||
Gaining Access cyber security | - | |||
Various Types of Hacking attacks | - | |||
Deauthenticate the Wireless Client | - | |||
Fake Authentication Attack | - | |||
WEP Cracking cyber security | - | |||
Encryption Tools-cyber security | - | |||
WEP Introduction cyber security | - | |||
Hacking Operating Systems | - | |||
WPA Theory-cyber security | - | |||
Pen Test Strategies-cyber security | - | |||
Penetration Testing-cyber security | - | |||
ARP Request Replay Attack | - | |||
Intrusion Detection System and the IDs Tools | - | |||
Ethical Hacking Tools-cyber security | - | |||
Windows Hacking Tricks | - | |||
Capturing handshakes-cyber security | - | |||
Penetration Testing Tool | - | |||
Handshake Theory-cyber security | - | |||
Creating wordlist-cyber security | - | |||
Cracking wordlist | - | |||
Secure USB Drives with BitLocker | - | |||
Securing Network from Attack | - | |||
Use Pen drive to fast your computer | - | |||
Post- Connection Attacks | - | |||
Disable Error Reporting in Windows 7 | - | |||
Cyber Security Live Class Day 4 | - |
Topic | Text Material | Image content | Video content | Quiz |
---|---|---|---|---|
How to Display Legal Notice on Start up of your Windows | - | |||
Ultra-speed Shutdown of Windows 7 | - | |||
Netdiscover-cyber security | - | |||
Local Group Policies Related Hacking | - | |||
ARP spoofing using arpspoof | - | |||
Man-in -the-Middle Attacks | - | |||
How to Disable or Enable Folder Options in Windows 7 | - | |||
Zenmap-cyber security | - | |||
Shortcuts Related Hacking | - | |||
ARP spoofing using MITMf | - | |||
DVWA Installation | - | |||
Cyber Security Live Class Day 5 | - | |||
Cyber Security Live Class Day 6 | - |
Topic | Text Material | Image content | Video content | Quiz |
---|---|---|---|---|
Cyber Security Live Class Day 13 | - | |||
Cyber Security Live Class Day 10 | - | |||
Cyber Security Live Class Day 11 | - | |||
Cyber Security Live Class Day 7 | - | |||
Cyber Security Live Class Day 8 | - | |||
Nmap Series - Cyber Security Live Class Day 17 | - | |||
Cyber Security Live Class Day 9 | - | |||
Cyber Security Live Class Day 12 | - |
Topic | Text Material | Image content | Video content | Quiz |
---|---|---|---|---|
Cyber Security Live Class Day 14 | - | |||
Cyber Security Live Class Day 15 | - | |||
Nmap Series - Cyber Security Live Class Day 18 | - | |||
Cyber Security Live Class Day 16 | - |
Cyber security
Earn official recognition for your work, and share your success with friends, colleagues, and employers.
Preethi shares her KaaShiv learning experience helped her gain an edge in job interviews and land a job.
Madhusan shares her KaaShiv learning experience helped her gain an edge in job interviews and land a job.
Vignesh shares her KaaShiv learning experience helped her gain an edge in job interviews and land a job.
We have a lifetime 24x7 online support team to resolve all your technical queries, through a ticket based tracking system.
Successfully complete your final course project and Kaashiv will certify you as a Cyber security Expert.
We have a community forum for all our learners that further facilitates learning through peer interaction and knowledge