Cyber Security & Ethical Hacking
A proud initiative under the Nenasala Project, launched by the Information and Communication Technology Agency of Sri Lanka (ICTA) and the Ministry of Telecommunication and Digital Infrastructure.
- Duration: 3 Months
- Lectures: Online
Course Details
In today’s digitally-connected world, cyber threats are escalating rapidly. The Certificate / Diploma in Cyber Security at Nenasala Campus Peradeniya equips you with the essential knowledge and hands-on skills to defend information assets, investigate security incidents and design secure systems. The programme is aimed at those who wish to pursue careers in cybersecurity, network security, IT risk management or related fields — whether you are just starting out in ICT, or already working in IT and want to upskill.
What will this course bring to you?
- Comprehensive Curriculum: Covers a wide range of subjects.
- Government Affiliation: Operates under the supervision of ICTA
Sri Lanka. - Recorded Lectures: Access recordings of all online sessions.
- Beginner-Friendly: No prior knowledge required—courses start
from the basics. - 18 Years of Service: Continuous service since 2006.
- Government-Recognized Certificates: Receive certificates
accepted by the government upon course completion. - Career Guidance: Support and mentorship for your
career journey.
Modules :
INTRODUCTION TO ETHICAL HACKING
* What Is Hacking ?
* What is Ethical Hacking ?
* What are the Types of Hackers ?
* Phases of Ethical Hacking
* Advantages of being an ethical hacker
* Skills Required to Become a Ethical Hacker
* Ethical Hackers Responsibilities
* What are the types of ethical hacking jobs ?
* Top Certifications for Ethical Hackers
* How to Protect Yourself from Hacking
FUNDAMENTALS OF NETWORKING
* What Is Networking ?
* What Is IP Address ?
* What Is Mac Address ?
* What Is TCP AND UDP ?
* Port Numbers and Protocols
* What Is Subnetting ?
* What is Firewall ?
SETTING-UP HACKING LAB
* What Is Hacking Lab
* What Is Virtual Machines ?
* Downloading And Installing Oracle VM VirtualBox ?
* Downloading And Installing Kali Linux In VirtualBox
* Downloading And Installing Metasploit In VirtualBox
* Downloading And Installing Windows 7 In VirtualBox
* Downloading And Installing Windows 10 In VirtualBox
INTRODUCTION TO LINUX
* Navigating Through Linux System
* Creating Files & Managing Directories
* Network Commands & Sudo Privileges In Kali
* Linux File System & Additional Commands
* Viewing,Creating, and Editing Files
* Installing and Updating Tools
INFORMATION GATHERING (Reconnaissance)
* What is Information Gathering ?
* Obtaining IP Address, Physical Address Using Whois Tool
* Whatweb Stealthy Scan
* Gathering Emails Using theHarvester & Hunter.io
* How To Download Tools Online
* Finding Usernames With Sherlock
* Bonus – Email Scraper Tool In Python 3
SCANNING
* Introduction to Scanning
* Netdiscover
* Master with Nmap
* Scanning Target Device Os With Nmap
* Scan Port and Port Software Versions
* sF scan Explain
VULNERABILITY ANALYSIS
* Vulnerability Analysis with nmap
* Vulnerability Analysis with Nessus
* Manual Vulnerability Analysis
* Linux Vulnerability Analysis
* Windows Vulnerability Analysis
EXPLOITATION & GRANING ACCESS WITH VIRUSES/TROGENS/PAYLOADS
* What is Exploitation
* What is a Vulnerability
* Reverse Shells, Bind Shells …
* Metasploit Framework Structure
* Msfconsole Basic Commands
* Our First Exploit – vsftp 2.3.4 Exploitation
* Misconfigurations Happen – Bindshell Exploitation
* Information Disclosure – Telnet Exploit
* Software Vulnerability – Samba Exploitation
* Attacking SSH – Bruteforce Attack
* Exploitation Challenge – 5 Different Exploits
* Explaining Windows 7 Setup
* Eternal Blue Attack – Windows 7 Exploitation
* DoublePulsar Attack – Windows Exploit
* BlueKeep Vulnerability – Windows Exploit
* Routersploit
* Router Default Credentials
* Setting Up Vulnerable Windows 10
* Crashing Windows 10 Machine Remotely
* Exploiting Windows 10 Machine Remotely
* Generating Payloads with msfvenom
* Generating payloads with fatrat
* Bypassing Antivirus & FUD s
* Create own Payload with python
POST EXPLOITATION
* Post Exploitation Theory
* Meterpreter Basic Commands Part 1
* Meterpreter Basic Commands Part 2
* Elevating Privileges With Different Modules
* Creating Persistence On The Target System
* Post Exploitation Modules
WEB APPLICATION PENETRATION TESTING
* Introduction to web penetration
* Information Gathering with Dirb tool
* Master with Burpsuite
* Shellshock Exploitation
* Command injection Exploitation
* Cross site scripting
* HTML Injection
* SQL Injection
* CSRF Vulnerability
* Hydra Beforce Attack
MAN IN THE MIDDLE – MITM
* Theory – Man In The Middle Attack
* Bettercap ARP Spoofing
* Ettercap Password Sniffing
* Manually Poisoning Targets ARP Cache With Scapy
20,000(LKR)
Features
- Live Q&A Sessions
- Lifetime Access
- Mobile and TV Access
- Certificate of Completion
- Downloadable Resources
- Interactive Quizzes
For Details About The Course