Networking & Ethical Hacking
Course
(2 days Workshop)
Workshop
Introduction to Networking & Ethical Hacking Course
This course provides a comprehensive foundation with essential skills in computer
networking and cybersecurity, focusing on both defensive and offensive security
strategies. The course covers how networks function, common vulnerabilities, and
ethical hacking techniques used to identify and fix security flaws. Students learn to
perform vulnerability analysis, secure systems, and defend against cyber threats—all
while adhering to legal and ethical guidelines.
Workshop Day 01: NETWORKING
Module 01: Networking Fundamentals
Introduction to Networking
Types of Networks (LAN, WAN, MAN, PAN)
Ethernet Cable
Network Devices (Router, Switch, Hub, Bridge, Modem)
Module 02: Network Services
HTTP Overview
HTTPs
FTP Overview
SFTP
SMTP
POP3
IMAP
RDP
DHCP & DNS
SSH
Telnet
Module 03: IP Addressing & Subnetting
MAC vs IP Address
IPv4 Address & IPV6
IPV4 classes
Public vs Private Ips
NAT
Subnetting
Special IP Addresses (Loopback, Broadcast, Multicast)
Module 04: Network Design & Topologies
Star, Mesh, Ring, Bus Topologies
Redundancy and High availability
Fault Tolerance
Module 05: Network Models
TCP & UDP
OSI Model (7 Layers)
TCP/IP Model
Module 06: Network Security
Firewalls and Access Control Lists (ACLs)
Cryptography
VPNs and Tunnelling Protocols
Common Attacks
CIA Triad
SSL & TLS
Module 07: Anonymity
Anonymity
Dark web & Block Chain
Module 08: Emerging Technologies
NFV (Network Functions Virtualization)
IoT Networking
5G & Edge Networking
Module 09: Career & Certification Pathways
Industry Certifications
Career Pathways
Workshop Day 02: ETHICAL HACKING
Module 01: Introduction to Ethical Hacking
What is Ethical Hacking?
Types of Hackers
Types of Hacking
Benefits of Ethical Hacking
Phases of Ethical Hacking
Module 02: Footprinting and Reconnaissance
Passive and Active Recon
DNS Interrogation
Email Harvesting
Module 03: Scanning and Enumeration
Network Scanning
Vulnerability Scanning
Banner Grabbing and OS Fingerprinting
What is Enumeration?
Services and Ports to Enumerate
Module 04: System Hacking
Password Cracking Techniques
Privilege Escalation
Keyloggers and Spyware
Steganography
Module 05: Sniffing and Spoofing
Packet Sniffing
ARP Poisoning
MAC Spoofing
DNS Spoofing or DNS Cache poisoning
Module 06: Malware and Backdoors
Types of Malwares: Virus, Worm, Trojan
Creating and Using Backdoors
RATs and Botnets
Malware Detection and Prevention
Module 07: Social Engineering
Phishing, Vishing, Tailgating
Human-based and Computer-based Techniques
Countermeasures and Awareness Training
Module 08: Web Application Hacking
OWASP Top 10
SQL Injection, XSS, CSRF
Module 09: Wireless Network Hacking
Rogue Access Points
Evil Twin Wireless
Module 10: Encryption
Encryption
Hashing
Public Key Infrastructure
Module 11: PenTesting & Ethical Hacking Terminologies
Types: Black Box, White Box, Grey Box
Phases of PenTesting
Writeup/Report
TTP, CVE, CVSS & NVD
Cyber Kill Chain
Cyber Threat Intelligence
Module 12: Tools & Framework
Kali Linux and Parrot OS
Metasploit Framework
Wireshark, Netcat, Nikto, John the Ripper
Module 13: Career & Certification Pathways
Certification
Practise Platforms
Building a Pentesting Lab
Build a SOC environment
Course Training Plan:
Week 1
Day Topic
Day 1 Networking Fundamentals
Day 2 Network Design & Topologies
Day 3 Reconnaissance & OSINT Tools – WHOIS & NSLookup
Maltego & The Harvester
Day 4
Visualize connections between digital entities
Day 5 Combine WHOIS, NSLookup, Dorking, Harvester on a test domain
Week 2
Day Topic
Day 1 Scanning & Discovery Tools
Day 2 Vulnerability scanning with GUI
Day 3 Write a short report on method + findings
Set up OpenVAS on Kali or Docker
Day 4 Scan for vulnerabilities on test machines
Scan a test network (Metasploitable, OWASP VM) using Nmap,
Day 5
Nessus, and OpenVAS
Week 3
Day Topic
Day 1 Brute force vs dictionary vs hybrid attacks
Day 2 How rainbow tables work vs hashing
Day 3 DOS &DDOS simulation on a target
Day 4 Steganography
Day 5 Phishing & Phishing Analysis
Week 4
Day Topic
Day 1 Packet sniffing, filters, TCP handshakes
Day 2 Tcpdump - CLI packet sniffer
Day 3 Capture and export packets for analysis in Wireshark
Capture and analyze HTTP, DNS, FTP traffic
Day 4
Extract data from PCAP
Day 5 Write a short report on method + findings
Learning Outcomes
Proficiency in Network and Ethical hacking concepts & tools
3 Mini Projects + 1 Capstone
Career guidance from experienced professionals
Certification of Completion