Cyber Security and Ethical Hacking - 45 Hrs Summer Training Program'26

Mon, 15 Jun, 8:00 AM – Sat, 20 Jun, 2:00 PM
|
IIT Madras Research Park, Chennai

About

About the Event


40-45 HOUR SUMMER BOOTCAMP/INTERNSHIP PROGRAM 2026 WITH PROJECT AT IIT MADRAS RESEARCH PARK BY TECHOBYTES IN COLLABORATION WITH EDC IIT DELHI


About Techobytes


Techobytes Technologies is recognised as a leading expert in the design and delivery of technical, soft and hard skills training from individual courses and seminars to certification programs and full-scale training solutions, from classroom training to online training.


Duration: The event is scheduled for 6 consecutive days, from 15th June 2026 to 20th June 2026.


The training will include 40-45 hours of intensive learning with a project, covering concepts from basic to advanced level.


Note: Candidates opting for the offline course in Chennai will also receive access to one complimentary 40 HRS online course of their choice.


Benefits and certification:


- 40-45 hours certification/internship program.


- 3 certificates in each training. (Participation Certificate + Recommendation/Internship Certificate + Project Completion Certificate)


- Updated industry-equipped curriculum.


- Work on live projects.


- Hands-on training by certified trainers from the industry.


- Complimentary resume and CV building session.


- Get an opportunity to attend a technical workshop from Techobytes in IIT’s.


Level: Beginner to Advanced


Target Audience: Open to ALL, B.tech, B.E, B.sc IT, M.sc IT, IT Sector, Programmers, Undergraduate students, early researchers, or professionals entering into Cyber domain or want to make their career in the same.


Cyber Security & Ethical Hacking


Module 1: Cyber Security Foundations


● Cyber Security landscape & modern threats


● Ethical Hacking methodology & frameworks (CEH, OWASP, MITRE ATT&CK)


● Types of hackers & attack surfaces


● Introduction to AI in Cyber Security


Module 2: Footprinting & Reconnaissance (Advanced)


● Active & Passive reconnaissance


● OSINT (Open Source Intelligence) tools


● AI-powered reconnaissance techniques


● Tools: Maltego, Recon-ng, Shodan


Module 3: Network Scanning & Enumeration


● Advanced Nmap scanning & scripting (NSE)


● Service & vulnerability detection


● Enumeration techniques (users, shares, DNS, SNMP)


● Hands-on: Network mapping & analysis


Module 4: System Hacking & Privilege Escalation


● Password cracking (modern techniques)


● Credential attacks (brute force, dictionary, rainbow tables)


● Privilege escalation (Windows/Linux)


● Post-exploitation techniques


Module 5: Malware & Threat Analysis


● Viruses, worms, trojans, ransomware


● Malware analysis basics (static & dynamic)


● AI-based malware detection


● Botnets & modern cyber threats


Module 6: Sniffing, MITM & Network Attacks


● Packet sniffing & analysis (Wireshark)


● Man-in-the-Middle (MITM) attacks


● Session hijacking techniques


● Secure communication practices


Module 7: Social Engineering & Human Hacking


● Phishing, spear phishing, vishing


● Social engineering toolkit (SET)


● AI-driven phishing attacks & deepfakes


● Defense strategies


Module 8: Web Application Security (Modern OWASP Top 10)


● SQL Injection (manual + automated)


● Cross-Site Scripting (XSS)


● Command injection & CSRF


● Authentication & session vulnerabilities


● Hands-on: DVWA / Juice Shop


Module 9: Wireless & Network Security


● Wi-Fi security (WPA2/WPA3 attacks)


● Wireless hacking tools


● Network hardening techniques


● Hands-on: Wireless penetration testing


Module 10: Defense, IDS/IPS & Firewalls


● Firewalls, IDS/IPS systems


● Honeypots & deception technologies


● Log monitoring & SIEM basics


● Incident detection & response


Module 11: Cloud & Mobile Security (Updated)


● Cloud security (AWS/Azure basics)


● Mobile app vulnerabilities


● API security


● Zero Trust Architecture


Module 12: AI in Cyber Security (NEW – High Demand)


● AI for threat detection & anomaly detection


● AI-based security automation


● Using AI tools for penetration testing


● Adversarial AI (attacks on AI systems)


Module 13: Advanced Exploitation Techniques


● Buffer overflow basics


● Exploit development (intro)


● Metasploit framework (advanced usage)


● Payload creation & execution


Module 14: Penetration Testing & Red Teaming


● Penetration testing lifecycle


● Red team vs Blue team concepts


● Vulnerability assessment


● Reporting & documentation


Module 15: Hands-on Labs & Real-World Practice


● Metasploit exploitation


● Nmap advanced scanning (NSE scripts)


● Network sweeping & live host detection


● Windows/Linux exploitation


● Password cracking (John the Ripper, Hashcat)


● Wireless attacks & security testing


● Web app hacking (DVWA, OWASP Juice Shop)


● XSS, command injection, shell exploitation


Module 16: Cryptography & Security Principles


● Encryption techniques (AES, RSA basics)


● Hashing & digital signatures


● Secure communication protocols


● Real-world cryptographic applications


Module 17: Career, Certifications & Industry Trends


● Cyber Security career paths


● Certifications (CEH, OSCP, Security+)


● Bug bounty & freelancing


● Future trends: AI security, Zero Trust, SOC


Deliverables


- Hands-on labs & real attack simulations 💻


- Lab manuals & assignments 📒


- Real-world penetration testing practice 🛠


- Certification & Internship Letter 📜


- Resume-ready skills 💼


- Project 


Get an immersive learning experience. Sessions will be led by industry experts, offering hands-on practicals and a cutting-edge curriculum aligned with industry standards.


By attending, you'll not only gain valuable tech knowledge but also have the opportunity to network with industry professionals and connect with fellow participants, expanding both your skills and your professional circle.


Thanks and regards,


Techobytes Technologies

IIT Madras Research Park, Chennai
8950.6 km away
Things to know
icon
Activity will be in English
icon
Duration 6 Days
icon
Ticket needed for ages 15 and above
icon
Entry allowed for ages 15 and above
icon
Layout Indoor
icon
Seating Arrangement Seated
icon
Kid friendly
icon
Pets not allowed
More
Terms and Conditions
Terms and Conditions
₹8,000
onwards