PROTONYTE CERTIFIED

CYBERSECURITY FUNDAMENTAL

PROTONYTE CERTIFIED

CYBERSECURITY FUNDAMENTAL

1st
Week

Course Introduction

  • Support Group (Important)

  • Flavors of Cyber Security

  • Notes Keeping

  • Important Tools

Networking

  • Introduction

  • IP Addresses & MAC Addresses

  • OSI Model

  • Common Ports and Protocols

  • TCP/UDP & Three-Way Handshake

  • Subnetting

Security Methodologies

  • Standards & Methodologies

  • Information Gathering (Reconnaissance)

  • Scanning & Enumeration

  • Vulnerability Scanning – Tools & Techniques

  • Exploitation – Tools & Techniques

3rd
Week

Course Introduction

  • Support Group (Important)

  • Flavors of Cyber Security

  • Notes Keeping

  • Important Tools

Networking

  • Introduction

  • IP Addresses & MAC Addresses

  • OSI Model

  • Common Ports and Protocols

  • TCP/UDP & Three-Way Handshake

  • Subnetting

Security Methodologies

  • Standards & Methodologies

  • Information Gathering (Reconnaissance)

  • Scanning & Enumeration

  • Vulnerability Scanning – Tools & Techniques

  • Exploitation – Tools & Techniques

5th
Week

Course Introduction

  • Support Group (Important)

  • Flavors of Cyber Security

  • Notes Keeping

  • Important Tools

Networking

  • Introduction

  • IP Addresses & MAC Addresses

  • OSI Model

  • Common Ports and Protocols

  • TCP/UDP & Three-Way Handshake

  • Subnetting

Security Methodologies

  • Standards & Methodologies

  • Information Gathering (Reconnaissance)

  • Scanning & Enumeration

  • Vulnerability Scanning – Tools & Techniques

  • Exploitation – Tools & Techniques

7th
Week

Course Introduction

  • Support Group (Important)

  • Flavors of Cyber Security

  • Notes Keeping

  • Important Tools

Networking

  • Introduction

  • IP Addresses & MAC Addresses

  • OSI Model

  • Common Ports and Protocols

  • TCP/UDP & Three-Way Handshake

  • Subnetting

Security Methodologies

  • Standards & Methodologies

  • Information Gathering (Reconnaissance)

  • Scanning & Enumeration

  • Vulnerability Scanning – Tools & Techniques

  • Exploitation – Tools & Techniques

1st
Week

Course Introduction

  • Support Group (Important)

  • Flavors of Cyber Security

  • Notes Keeping

  • Important Tools

Networking

  • Introduction

  • IP Addresses & MAC Addresses

  • OSI Model

  • Common Ports and Protocols

  • TCP/UDP & Three-Way Handshake

  • Subnetting

Security Methodologies

  • Standards & Methodologies

  • Information Gathering (Reconnaissance)

  • Scanning & Enumeration

  • Vulnerability Scanning – Tools & Techniques

  • Exploitation – Tools & Techniques

2nd
Week

Course Introduction

  • Support Group (Important)

  • Flavors of Cyber Security

  • Notes Keeping

  • Important Tools

Networking

  • Introduction

  • IP Addresses & MAC Addresses

  • OSI Model

  • Common Ports and Protocols

  • TCP/UDP & Three-Way Handshake

  • Subnetting

Security Methodologies

  • Standards & Methodologies

  • Information Gathering (Reconnaissance)

  • Scanning & Enumeration

  • Vulnerability Scanning – Tools & Techniques

  • Exploitation – Tools & Techniques

3rd
Week

Course Introduction

  • Support Group (Important)

  • Flavors of Cyber Security

  • Notes Keeping

  • Important Tools

Networking

  • Introduction

  • IP Addresses & MAC Addresses

  • OSI Model

  • Common Ports and Protocols

  • TCP/UDP & Three-Way Handshake

  • Subnetting

Security Methodologies

  • Standards & Methodologies

  • Information Gathering (Reconnaissance)

  • Scanning & Enumeration

  • Vulnerability Scanning – Tools & Techniques

  • Exploitation – Tools & Techniques

4th
Week

Course Introduction

  • Support Group (Important)

  • Flavors of Cyber Security

  • Notes Keeping

  • Important Tools

Networking

  • Introduction

  • IP Addresses & MAC Addresses

  • OSI Model

  • Common Ports and Protocols

  • TCP/UDP & Three-Way Handshake

  • Subnetting

Security Methodologies

  • Standards & Methodologies

  • Information Gathering (Reconnaissance)

  • Scanning & Enumeration

  • Vulnerability Scanning – Tools & Techniques

  • Exploitation – Tools & Techniques

5th
Week

Course Introduction

  • Support Group (Important)

  • Flavors of Cyber Security

  • Notes Keeping

  • Important Tools

Networking

  • Introduction

  • IP Addresses & MAC Addresses

  • OSI Model

  • Common Ports and Protocols

  • TCP/UDP & Three-Way Handshake

  • Subnetting

Security Methodologies

  • Standards & Methodologies

  • Information Gathering (Reconnaissance)

  • Scanning & Enumeration

  • Vulnerability Scanning – Tools & Techniques

  • Exploitation – Tools & Techniques

6th
Week

Course Introduction

  • Support Group (Important)

  • Flavors of Cyber Security

  • Notes Keeping

  • Important Tools

Networking

  • Introduction

  • IP Addresses & MAC Addresses

  • OSI Model

  • Common Ports and Protocols

  • TCP/UDP & Three-Way Handshake

  • Subnetting

Security Methodologies

  • Standards & Methodologies

  • Information Gathering (Reconnaissance)

  • Scanning & Enumeration

  • Vulnerability Scanning – Tools & Techniques

  • Exploitation – Tools & Techniques

7th
Week

Course Introduction

  • Support Group (Important)

  • Flavors of Cyber Security

  • Notes Keeping

  • Important Tools

Networking

  • Introduction

  • IP Addresses & MAC Addresses

  • OSI Model

  • Common Ports and Protocols

  • TCP/UDP & Three-Way Handshake

  • Subnetting

Security Methodologies

  • Standards & Methodologies

  • Information Gathering (Reconnaissance)

  • Scanning & Enumeration

  • Vulnerability Scanning – Tools & Techniques

  • Exploitation – Tools & Techniques

8th
Week

Course Introduction

  • Support Group (Important)

  • Flavors of Cyber Security

  • Notes Keeping

  • Important Tools

Networking

  • Introduction

  • IP Addresses & MAC Addresses

  • OSI Model

  • Common Ports and Protocols

  • TCP/UDP & Three-Way Handshake

  • Subnetting

Security Methodologies

  • Standards & Methodologies

  • Information Gathering (Reconnaissance)

  • Scanning & Enumeration

  • Vulnerability Scanning – Tools & Techniques

  • Exploitation – Tools & Techniques

2nd
Week

Course Introduction

  • Support Group (Important)

  • Flavors of Cyber Security

  • Notes Keeping

  • Important Tools

Networking

  • Introduction

  • IP Addresses & MAC Addresses

  • OSI Model

  • Common Ports and Protocols

  • TCP/UDP & Three-Way Handshake

  • Subnetting

Security Methodologies

  • Standards & Methodologies

  • Information Gathering (Reconnaissance)

  • Scanning & Enumeration

  • Vulnerability Scanning – Tools & Techniques

  • Exploitation – Tools & Techniques

4th
Week

Course Introduction

  • Support Group (Important)

  • Flavors of Cyber Security

  • Notes Keeping

  • Important Tools

Networking

  • Introduction

  • IP Addresses & MAC Addresses

  • OSI Model

  • Common Ports and Protocols

  • TCP/UDP & Three-Way Handshake

  • Subnetting

Security Methodologies

  • Standards & Methodologies

  • Information Gathering (Reconnaissance)

  • Scanning & Enumeration

  • Vulnerability Scanning – Tools & Techniques

  • Exploitation – Tools & Techniques

6th
Week

Course Introduction

  • Support Group (Important)

  • Flavors of Cyber Security

  • Notes Keeping

  • Important Tools

Networking

  • Introduction

  • IP Addresses & MAC Addresses

  • OSI Model

  • Common Ports and Protocols

  • TCP/UDP & Three-Way Handshake

  • Subnetting

Security Methodologies

  • Standards & Methodologies

  • Information Gathering (Reconnaissance)

  • Scanning & Enumeration

  • Vulnerability Scanning – Tools & Techniques

  • Exploitation – Tools & Techniques

8th
Week

Course Introduction

  • Support Group (Important)

  • Flavors of Cyber Security

  • Notes Keeping

  • Important Tools

Networking

  • Introduction

  • IP Addresses & MAC Addresses

  • OSI Model

  • Common Ports and Protocols

  • TCP/UDP & Three-Way Handshake

  • Subnetting

Security Methodologies

  • Standards & Methodologies

  • Information Gathering (Reconnaissance)

  • Scanning & Enumeration

  • Vulnerability Scanning – Tools & Techniques

  • Exploitation – Tools & Techniques

PCSF INSTRUCTOR

Experienced and accomplished manager & penetration tester with over 1.5 years of experience in offensive security. Adept at identifying vulnerabilities and exploiting them to strengthen organizational security. Recognized in 10+ Hall of Fame lists for discovering valid security bugs in major corporations such as Docbyte, nohat, and others.

Certifications:

  • Certified Ethical Hacker (CEH)

  • EC-Council Certified Security Analyst (ECSA)

  • Certified Red Team Professional (CRTP)

  • Certified Penetration Testing Engineer (CPTE)

  • Certified Vulnerability Assessor (CVA)

  • ISO 27001 Lead Implementer (LI)

STUDENT FEEDBACK

PASSOUT STUDENTS