Cyber Security Course
Cyber Security
The Certified Network & Security Associate (CNSA)
Students can also appear in CIEH, comTIA security + exams
Suitable For
working professionals / non-working professional and students
- Course Duration : 2-3 Months
- Language : Hindi | English
- Course Delivery : Online | offline
Course Content
CNSA is offered by ITE is a comprehensive program that provides students with the knowledge and skills required to excel in the cybersecurity industry.Graduates of the program will be equipped to pursue careers in areas like cybersecurity analysis, penetration testing, and ethical hacking.Course Content:
kali Linux | Networking
Open-Source Intelligence
Digital Footprint & Information Gathering
Password Cracking | OS Login Bypass
Malware Illustration | Vulnerability
Social Engineering
Hacking Using Google
Identifying the attack |ARP & DNS Poisoning
Wireless Hacking I DOS & DDOS Attacks
Vulnerable Web | SQL Injection | WAF
OWASP TOP 10|Bash Scripting / Nikto
Reverse Engineering | Exploiting OS by Metasploit
60-Day Cybersecurity Training Syllabus
Week 1: Foundations of Cybersecurity & Networking
Day 1: Introduction to Cybersecurity Concepts
Day 2: Threat Landscape & Attack Vectors (2025 Outlook)
Day 3: OSI & TCP/IP Models
Day 4: Subnetting Basics
Day 5: Firewalls, Proxies, IDS/IPS
Day 6: VPNs, NAT, and Routing Basics
Day 7: Weekly Review & Quiz
Week 2: Kali Linux & Bash Scripting
Day 8: Kali Linux Introduction & Tool Overview
Day 9: Linux File Systems & Permissions
Day 10: Linux User & Group Management
Day 11: Package Management & Repositories
Day 12: Introduction to Bash Scripting
Day 13: Automating Recon & Enumeration with Bash
Day 14: Practical Lab + Review (Bash scripting & Recon automation)
Week 3: Information Gathering & OSINT
Day 15: OSINT Techniques Overview
Day 16: WHOIS, DNS Lookup
Day 17: Shodan & Google Dorking
Day 18: Digital Footprinting & Metadata
Day 19: Passive vs Active Recon
Day 20: Lab: Building OSINT Profiles
Day 21: Weekly Recap & Practice
Week 4: Vulnerability Analysis & Exploitation
Day 22: CVEs, CVSS, Threat Modeling
Day 23: Using Nikto, Nmap for Scanning
Day 24: Working with OpenVAS
Day 25: Exploiting FTP & SMB