Cyber Security & Ethical Hacking

A proud initiative under the Nenasala Project, launched by the Information and Communication Technology Agency of Sri Lanka (ICTA) and the Ministry of Telecommunication and Digital Infrastructure.

Course Details

In today’s digitally-connected world, cyber threats are escalating rapidly. The Certificate / Diploma in Cyber Security at Nenasala Campus Peradeniya equips you with the essential knowledge and hands-on skills to defend information assets, investigate security incidents and design secure systems. The programme is aimed at those who wish to pursue careers in cybersecurity, network security, IT risk management or related fields — whether you are just starting out in ICT, or already working in IT and want to upskill.

What will this course bring to you?

  1. Comprehensive Curriculum: Covers a wide range of subjects.
  2. Government Affiliation: Operates under the supervision of ICTA
    Sri Lanka.
  3. Recorded Lectures: Access recordings of all online sessions.
  4. Beginner-Friendly: No prior knowledge required—courses start
    from the basics.
  5. 18 Years of Service: Continuous service since 2006.
  6. Government-Recognized Certificates: Receive certificates
    accepted by the government upon course completion.
  7. Career Guidance: Support and mentorship for your
    career journey.

Modules :

INTRODUCTION TO ETHICAL HACKING

* What Is Hacking ?
* What is Ethical Hacking ?
* What are the Types of Hackers ?
* Phases of Ethical Hacking
* Advantages of being an ethical hacker
* Skills Required to Become a Ethical Hacker
* Ethical Hackers Responsibilities
* What are the types of ethical hacking jobs ?
* Top Certifications for Ethical Hackers
* How to Protect Yourself from Hacking

* What Is Networking ?
* What Is IP Address ?
* What Is Mac Address ?
* What Is TCP AND UDP ?
* Port Numbers and Protocols
* What Is Subnetting ?
* What is Firewall ?

* What Is Hacking Lab
* What Is Virtual Machines ?
* Downloading And Installing Oracle VM VirtualBox ?
* Downloading And Installing Kali Linux In VirtualBox
* Downloading And Installing Metasploit In VirtualBox
* Downloading And Installing Windows 7 In VirtualBox
* Downloading And Installing Windows 10 In VirtualBox

* Navigating Through Linux System
* Creating Files & Managing Directories
* Network Commands & Sudo Privileges In Kali
* Linux File System & Additional Commands
* Viewing,Creating, and Editing Files
* Installing and Updating Tools

* What is Information Gathering ?
* Obtaining IP Address, Physical Address Using Whois Tool
* Whatweb Stealthy Scan
* Gathering Emails Using theHarvester & Hunter.io
* How To Download Tools Online
* Finding Usernames With Sherlock
* Bonus – Email Scraper Tool In Python 3

* Introduction to Scanning
* Netdiscover
* Master with Nmap
* Scanning Target Device Os With Nmap
* Scan Port and Port Software Versions
* sF scan Explain

* Vulnerability Analysis with nmap
* Vulnerability Analysis with Nessus
* Manual Vulnerability Analysis
* Linux Vulnerability Analysis
* Windows Vulnerability Analysis

* What is Exploitation
* What is a Vulnerability
* Reverse Shells, Bind Shells …
* Metasploit Framework Structure
* Msfconsole Basic Commands
* Our First Exploit – vsftp 2.3.4 Exploitation
* Misconfigurations Happen – Bindshell Exploitation
* Information Disclosure – Telnet Exploit
* Software Vulnerability – Samba Exploitation
* Attacking SSH – Bruteforce Attack
* Exploitation Challenge – 5 Different Exploits
* Explaining Windows 7 Setup
* Eternal Blue Attack – Windows 7 Exploitation
* DoublePulsar Attack – Windows Exploit
* BlueKeep Vulnerability – Windows Exploit
* Routersploit
* Router Default Credentials
* Setting Up Vulnerable Windows 10
* Crashing Windows 10 Machine Remotely
* Exploiting Windows 10 Machine Remotely
* Generating Payloads with msfvenom
* Generating payloads with fatrat
* Bypassing Antivirus & FUD s
* Create own Payload with python

* Post Exploitation Theory
* Meterpreter Basic Commands Part 1
* Meterpreter Basic Commands Part 2
* Elevating Privileges With Different Modules
* Creating Persistence On The Target System
* Post Exploitation Modules

* Introduction to web penetration
* Information Gathering with Dirb tool
* Master with Burpsuite
* Shellshock Exploitation
* Command injection Exploitation
* Cross site scripting
* HTML Injection
* SQL Injection
* CSRF Vulnerability
* Hydra Beforce Attack

* Theory – Man In The Middle Attack
* Bettercap ARP Spoofing
* Ettercap Password Sniffing
* Manually Poisoning Targets ARP Cache With Scapy

20,000(LKR)

Features

For Details About The Course

Scroll to Top