Cyber Security & Ethical Hacking.

Course Overview:

Defend. Protect. Empower.
In today’s digital world, cybersecurity is no longer optional—it’s essential. The Cybersecurity & Ethical Hacking course by TIIES is designed to transform passionate learners into skilled defenders of the digital realm. Over the course of 3 action-packed months, you will dive deep into the world of ethical hacking, security systems, and real-world cyber defense strategies. Whether you’re looking to build a career in cybersecurity or want to protect your digital presence, this course equips you with the tools and techniques to ethically hack systems and secure digital assets like a pro.

This is not just a course—it’s your gateway into one of the world’s most in-demand and future-proof industries.

Learning Outcomes

By the end of this course, learners will:

✅ Understand the fundamentals of cybersecurity, networking, and ethical hacking
✅ Identify vulnerabilities in systems and implement security measures
✅ Gain hands-on experience with penetration testing tools like Kali Linux, Metasploit, Wireshark & more
✅ Learn how to ethically hack into systems and networks for testing purposes
✅ Detect, prevent, and respond to cyber threats and attacks
✅ Build a solid foundation to pursue certifications like CEH (Certified Ethical Hacker)
✅ Develop critical thinking and ethical responsibility in digital environments
✅ Create a professional portfolio of security testing projects

Eligibility Criteria:

Who should get Enrolled:

Perks to join this Course:

What will you Learn:

Month 1: Cyber Security Fundamentals.
  • What is cybersecurity? Importance in the digital world
  • Types of cyber threats (malware, phishing, DDoS, etc.)
  • Key cybersecurity principles: CIA triad (Confidentiality, Integrity, Availability)
  • OSI & TCP/IP models
  • IP addressing, subnets, ports, and protocols
  • Common network devices & traffic flow
  • Packet sniffing basics (Wireshark intro)
  • Windows and Linux command-line basics
  • File systems, users, permissions
  • Introduction to VMs & setting up lab environment (VirtualBox/VMware)
  • Types of attacks (Brute Force, MITM, SQLi, etc.)
  • Social engineering & phishing
  • Understanding vulnerabilities (CVEs, zero-day.
Month 2: Core Cybersecurity Skills
  • Antivirus, Firewall, IDS/IPS.
  • Nmap for network scanning.
  • Burp Suite & OWASP ZAP for web scanning.
  • Metasploit basics.
  • OWASP Top 10.
  • Cross-site Scripting (XSS), SQL Injection, CSRF.
  • Secure coding practices.
  • Real-world web app attack labs (DVWA, WebGoat).
  • Hardening Windows & Linux systems.
  • Password policies & account management.
  • Software updates & patching strategies.
  • Group policies and security baselines.
  • Basics of SIEM (Splunk or ELK Stack).
  • Log sources: Windows Event Logs, Syslog.
  • Log analysis and alerting.
  • Incident detection basics.
Month 3: Advanced Topics & Hands-On
  • Kali Linux environment.
  • Enumeration, exploitation, privilege escalation.
  • Buffer overflow basics.
  • Capture The Flag (CTF) intro & practice.
  • Forensics process & tools (Autopsy, FTK Imager).
  • Memory, disk, and network forensics.
  • Incident Response lifecycle (NIST framework).
  • Introduction to security policies & frameworks (ISO 27001, NIST, GDPR).
  • Risk assessment & mitigation.
  • Business continuity & disaster recovery planning.
  • Roles in cybersecurity: Analyst, Pentester, Auditor, etc.
  • Resume building & job hunt strategy.
  • Prep for certifications: CompTIA Security+, CEH, or CISSP (overview).
  • Simulated attack & defense lab.
  • Build your own secure network.
  • CTF mini-challenges
  • Malware analysis basics.

Reviews say it LOUDER: