Comprehensive Cybersecurity Training
Offering basic and advanced cybersecurity training with hands-on practical labs and expert guidance.


Expert-Led Training Sessions
Learn from professionals with over 14 years of real-time cybersecurity experience and insights.
Interview Preparation Support
Access 300+ interview questions and answers to enhance your job readiness and confidence.
Job Assistance Services
Receive ongoing job support and on-the-job assistance for your career advancement.
Cybersecurity Career
Master cybersecurity skills with expert training, practical labs, and comprehensive interview preparation support.
Cyber Security and Ethical Hacking Course Content & Schedules
Week 1 : Introduction , Client Server Communication and HTTP, HTTPS, 3 Tier Architecture, DB, APP, Web Server , SDLC - Severity, Priority, Functional Testing vs Performance Testing vs Security testing , Real Time Security Breaches , Risks associated, Security Principles, Different Types of Hackers, Overview of Vulnerability Scanners - Web, Network , Web Technologies - HTML , CSS, JavaScript - Click Jacking Vulnerability
Week 2 : IT Eco system - Intranet, Internet, DMZ, IP address, External vs Internal , l , IP Range , Loopback IP, Static IP, Dynamic IP, DHCP Server, DNS Server , Asset, Risks, Vulnerabilities, Threats, Threat Agents , Phases of Pen Testing , Tools across different Phases , Open Source Intelligence Methodology - Details to Collect , Windows System Hacking & Web Application Hacking using File Upload Vulnerability ,OS and Virtualization - Hyper V- Type 1 and type 2, Cloud Computing
Week 3 : Test Lab setup – Kali Linux VM setup for Hacking and Labs, Troubleshoot Lab setup in every System and Practice of Windows Hacking, File Upload vulnerability , Basic SQL Queries , Database Concepts , SQL injection- Database Hacking - Theory and Labs - Tools : SQL map , Types of SQL injection and Remediation
Week 4 : XSS (Cross Site Scripts) vulnerability – Lab - Tools : Kali Linux, Metasploit , session Hijacking - Lab - Tools : Kali Linux, Metasploit, netcat , Session Hijacking & Types - Lab - Tools : Kali Linux, Metasploit, netcat , SSRF , Host Header Injection, Insecure Design Data Tampering (IDOR) - Tools : BurpSuite
Week 5 : CSRF, BOF Password Hacking, Strength of Password, Bruteforce Attack - Lab - Tools : Hydra , Web Vulnerability Scanners - Tools : ZAP , Web Vulnerability Scanners - Tools : Nessus and IBM App Scan , Computer Networks - Internet , Intranet, DMZ, OSI model, TCP/IP model , Layers of OSI TCP, Ports , Protocols
Week 6 : 3 w 3 way TCP IP Handshake, TCP Flags - Network Sniffing, Scanning and Enumeration - Tools : nmap, Wireshark , DOS and DDOS Attacks Tools : hping3, , Cryptography -Encryption, Digital Certificates, Hashing Secure SDLC, Threat Modeling, STRIDE , DRIDE , CVSS , OWASP Top 10 Web , SANS25 , GDPR, PCI-DSS, ISO 27001 , HIPPA
Week 7 : External and Internal IP Scanning , Firewalls, AV, End point management, IPS/ IDS, Malware Analysis , Scope Analysis, Security Test strategy , Estimation, Remediation, False Positive Analysis & Reporting , API Pen Testing - Tools : POSTMAN, Cookie Editors , OWASP Top 10 for API SANS 25
Week 8 : SAST (Static Application Security Testing ) Tools - Source code Analysis DevSecOps , Agile Process , Resume Preparation, Real Time Real Time Projects, Mock Interview, Profile Building , Bug Bounty – Overview, Registration and Process , 300+ Cyber Security - Interview Questions (Walkthrough) ,Any Pending concepts will be continued for 3 to 4 days based on the course coverage and Attendees learning speed.














Contact Us for Cybersecurity Support
Reach out for training, job support, and expert assistance.


OUR OFFICE ADDRESS
Magna InfoTech , 4th Floor, VSM Buildings,
Beside Nexa Showroom, Renigunta Road,
Tirupati-517501.
+91 636 693 0591
Magna Infotech © 2018. All rights reserved.
CONTACT US
HAVE ANY QUESTIONS ?
contact@magna-it.in
Send an email for inquiries, our Team will get back to you within a 24 hours
FOLLOW US
+91 905 999 2102
