February 27, 2026@ 05:05 AM
Every organization's day-to-day functioning depends on the proper utilization of information communication technology (ICT). Cybersecurity is the only approach that provides peace of mind to entrepreneurs by securing all electronic systems having crucial information. It is the way of defending computers, mobiles, electronic systems, networks, and automation devices contributing to organizational success. This certificate course gives the knowledge and hands-on training to protect your business assets and the experience you deliver to your customers. That way you retain and grow your customers’ confidence in your brand.
Individuals having sharp, keen minds, motivated with ethical behavior in information management, and are willing to defend organizations from cyber-attacks and from internal and external rogue elements. The program features are:
The students completing this course will have opportunities to work inside the country as well as abroad as:
The curriculum includes understanding the following modules:
|
Module |
Topic |
|
|
Module-1 |
Cyber-security Basic |
● Course Introduction ● Common Cyber-security Threats ● Threat Defense ● Ethical Hacking ● Types of Hackers ● Course Applications ● Tools used in course |
|
Module-2 |
Setup of Virtual Machine of Kali Linux |
● Kali Linux overview ● Download VM of Kali Linux ● Setup Kali Linux in Virtual box |
|
● Network settings of Virtual box ● Kali Linux commands ● Virtual Technology tools ● VMware ● Virtual box ● Kali Linux |
||
|
Module-3 |
Information Gathering |
● Overview of Foot printing ● Different Techniques ● Methodologies ● Foot printing through Social Engineering ● Countermeasure |
|
Module-4 |
Network Security |
● Basic Network Concepts and Common Network Devices ● Network Scanning ● Enumerating network ports ● Nmap ● Wireshark ● Metasploit Auxiliary |
|
Module-5 |
Vulnerability Assessment |
● Overview of VAPT ● Different Techniques ● Various Methodologies ● Tools used in VAPT ● Reporting ● Nessus ● Nexpose |
|
Module-6 |
Exploitation |
● Installation of Metasploit Framework ● Auxiliaries module ● Payloads module ● Exploits module ● Exploit Window XP/7/8.1 ● Exploit Metasploitable 2 |
|
Module-7 |
Post-Exploitation |
● Escalating user privileges ● Capturing keystrokes on the target system ● Executing custom PowerShell scripts for performing additional tasks ● Making the access persistent |
|
Module-8 |
Wifi security |
● Wireless Standards ● Wireless Authentication ● Wireless Hacking Tools ● Hack wireless password key ● Wifi Authentication and Deauthentication |
|
● Wifi Evil Tower (Fake wifi) ● Aircrack-ng ● Airmon-ng ● Fluxion |
||
|
Module-9 |
Password Cracking |
● Encryption technology ● Extract password hash ● Brute force attack ● Dictionary Attack ● Hybrid Attack ● Window password cracking methods ● Files Passwords (word, Pdf, zip, rar, excel) ● Hash CAT ● John the ripper |
|
Module-10 |
Web Security |
● Web Technology ● Web Attacks ● Web Login Password-cracking ● Web Application Firewalls (WAFs) ● DDoS ● MiTM ● DVWA ● Hydra |
|
Module-11 |
Database Security |
● Database Technology ● SQL Injection (SQLi) ● Cross-site Scripting Attack ● Remote File Inclusion ● Cross-site forgery ● Sqlmap ● Hydra |
|
Module-12 |
Digital Forensic |
● Data integrity forensics ● Malware forensics in sandbox ● OS forensics ● File System Forensics ● Network Forensics ● Wireshark ● Autopsy |
Ready to take the Cybersecurity course?
Register for a free sample lesson on Certificate of Cybersecurity
February 27, 2026@ 05:05 AM
National Skills University is the first platform to provide opportunities for youth benefitting from several ongoing initiatives.
Information Desk: info@nsu.edu.pk
Sector H-8/1, Faiz Ahmed Faiz Road,
Islamabad, Pakistan
Monday - Friday: 8:00 AM to 4:00 PM