Stelor

Cyber Security

Learn ethical hacking, network security, and real-world cyber defense techniques through hands-on practical training and industry-focused projects.

CYBER SECURITY COURSE

Protect the Digital World with Cyber Security Skills

Learn how to identify vulnerabilities, protect systems, and defend networks from cyber threats. This course covers ethical hacking, network security, malware analysis, and real-world cyber defense techniques through practical training.

CYBER SECURITY CURRICULUM

Comprehensive Cyber Security Training from Basics to Advanced

  • Lesson 01: Introduction to Cybersecurity — Theory
  • Lesson 02: Introduction to Ethical Hacking — Theory
  • Lesson 03: Types of Cybersecurity Threats — Theory
  • Lesson 04: CIA Triad — Theory
  • Lesson 05: Cyber Laws and Ethics — Theory
  • Lesson 06: Dark Web vs Deep Web — Theory
  • Lesson 07: How TOR Browser Works — Theory + Practical
  • Lesson 08: Safe Dark Web Browsing (Legal Awareness) — Theory + Practical
  • Lesson 09: VirtualBox Installation (Kali Linux, Windows) — Practical
  • Lesson 10: Kali Linux Interface and Terminal — Practical
  • Lesson 11: Linux Command Line Practice — Practical
  • Lesson 12: Networking Basics (LAN, WAN, MAN) — Theory
  • Lesson 13: TCP/IP and OSI Model — Theory
  • Lesson 14: Common Protocols (HTTP, HTTPS, FTP, SSH) — Theory + Practical
  • Lesson 15: IP Addressing, Ping, Traceroute — Practical
  • Lesson 16: DNS and Internet Working — Theory + Practical
  • Lesson 17: Nmap and Zenmap Scanning — Practical
  • Lesson 18: Web Application Security + OWASP — Theory + Practical
  • Lesson 19: DVWA and Web Lab Setup — Practical
  • Lesson 20: Burp Suite Training — Practical
  • Lesson 21: XSS and CSRF — Theory + Practical
  • Lesson 22: IDOR and Price Tampering — Theory + Practical
  • Lesson 23: Brute Force and OTP Bypass — Practical
  • Lesson 24: WPScan and ExploitDB — Practical
  • Lesson 25: Proof of Concept (POC) Creation — Practical
  • Lesson 26: Malware (Virus, Worm, Trojan) — Theory
  • Lesson 27: Malware Analysis Basics — Theory + Practical
  • Lesson 28: Phishing and Social Engineering — Theory + Practical
  • Lesson 29: Camphish Tool Practice — Practical
  • Lesson 30: DoS and DDoS Attacks — Theory + Practical
  • Lesson 31: SQL Injection Attacks — Theory + Practical
  • Lesson 32: SQLmap Tool Practice — Practical
  • Lesson 33: Wireless Network Attacks — Theory + Practical
  • Lesson 34: Aircrack-ng Suite — Practical
  • Lesson 35: WiFi Jamming and Deauthentication — Practical
  • Lesson 36: WiFi Hacking Practical Lab — Practical
  • Lesson 37: Network Sniffing (Wireshark) — Practical
  • Lesson 38: Man-in-the-Middle Attacks — Theory + Practical
  • Lesson 39: System Hardening and Firewall — Practical
  • Lesson 40: Log Monitoring and Incident Response — Theory + Practical
  • Lesson 41: Website / Network Security Project — Practical
  • Lesson 42: Phishing Defense Project — Practical
  • Lesson 43: Final Report and Portfolio — Theory + Practical