
PROTONYTE CERTIFIED
CYBERSECURITY FUNDAMENTAL
1st
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
3rd
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
5th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
7th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
1st
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
2nd
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
3rd
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
4th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
5th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
6th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
7th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
8th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
2nd
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
4th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
6th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques
8th
Week
Course Introduction
Support Group (Important)
Flavors of Cyber Security
Notes Keeping
Important Tools
Networking
Introduction
IP Addresses & MAC Addresses
OSI Model
Common Ports and Protocols
TCP/UDP & Three-Way Handshake
Subnetting
Security Methodologies
Standards & Methodologies
Information Gathering (Reconnaissance)
Scanning & Enumeration
Vulnerability Scanning – Tools & Techniques
Exploitation – Tools & Techniques




PCSF INSTRUCTOR
Experienced and accomplished manager & penetration tester with over 1.5 years of experience in offensive security. Adept at identifying vulnerabilities and exploiting them to strengthen organizational security. Recognized in 10+ Hall of Fame lists for discovering valid security bugs in major corporations such as Docbyte, nohat, and others.
Certifications:
Certified Ethical Hacker (CEH)
EC-Council Certified Security Analyst (ECSA)
Certified Red Team Professional (CRTP)
Certified Penetration Testing Engineer (CPTE)
Certified Vulnerability Assessor (CVA)
ISO 27001 Lead Implementer (LI)
STUDENT FEEDBACK

Muhammad Abdullah
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Muhammad Abdullah
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Muhammad Abdullah
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Muhammad Abdullah
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Muhammad Abdullah
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.



