TEDORA HACKERS ACADEMY

Launch Your
Cybersecurity Career
In One Month

Master the fundamentals of networking, operating systems, and offensive & defensive security with an industry-aligned curriculum.

30 Days

Intensive Program

100%

Hands-On Labs

Job Ready

Career Focused

Industry-Recognized

Master the fundamentals of cybersecurity with an industry-aligned curriculum designed for market needs.

Hands-on Labs

Practical exercises covering networking, OS, offensive and defensive security techniques.

Career-Focused

Gain essential cybersecurity skills to start your journey as a professional immediately.

Comprehensive

Understand networking, ethical hacking, security operations, and digital forensics.

The Advantage

Why Choose This Program?

Comprehensive Training

Covers fundamental cybersecurity concepts, networking, OS security, and security operations.

Real-World Simulations

Engage in hands-on offensive and defensive security scenarios on our Cyber Range.

Industry Knowledge

Gain essential skills for real-world cybersecurity challenges recognized by employers.

Flexible Learning

Choose between live instructor-led, self-paced, and in-person training modes.

The Syllabus

Course Outline

Click modules to expand details

01 Introduction to Cybersecurity, Awareness & Opportunities
+

Understand cybersecurity fundamentals, its real-world impact, and the growing need for security professionals. Explore career opportunities and the skills required to excel.

  • Overview of Penetration Testing & Methodology
  • Hacking Vs Penetration Testing
  • Scoping Organizational/Customer Requirements
  • Compare Standards and Methodologies
  • Defining Rules of Engagement
02 Networking Fundamentals
+

Gain foundational knowledge of networking concepts, protocols, OSI & TCP/IP models. Hands-on labs cover firewall configurations, IDS/IPS, and Wireshark.

  • Cyber Security Fundamentals
  • Network Security Fundamentals
  • Network Topologies & IP Addressing
  • Network Monitoring Tools (Wireshark, Nmap)
03 Understanding Operating Systems
+

Explore Windows and Linux operating systems, user management, and command-line utilities. Develop hands-on skills in OS administration and security.

  • Introduction to OS (Windows & Linux) & Architecture
  • User and Group Management in Linux
  • File System Structure & Permissions (chmod, chown)
  • PowerShell Cmdlets and Basic Scripting
  • Linux Package Management (apt, yum, dnf)
  • OS Hardening Basics & Troubleshooting
04 Introduction to Offensive Security
+

Learn the principles of ethical hacking and penetration testing. Explore tools like Nmap, Metasploit, and Burp Suite to identify and exploit vulnerabilities.

  • Ethical Hacking Fundamentals
  • Offensive Security Methodologies
  • Vulnerability Assessment Basics
  • Web Application Security Testing
  • Exploitation and Post-Exploitation
  • Security Tools Overview (Nmap, Metasploit, Burp Suite)
05 Introduction to Defensive Security
+

Understand threat detection, incident response, and digital forensics. Learn about SOC, IDS/IPS, and patch management.

  • Defensive Security Fundamentals
  • Threat Detection and Monitoring
  • Security Operations Center (SOC) Overview
  • Incident Response Process
  • Patch and Vulnerability Management
  • Cybersecurity Monitoring and Reporting
06 Planning and Scoping
+

Learn how to scope penetration tests by identifying organizational requirements and compliance considerations like OWASP, NIST, and MITRE ATT&CK.

  • Introduction to Penetration Testing Scoping
  • OWASP Testing Guide & NIST Cybersecurity Framework
  • MITRE ATT&CK Framework & Cyber Kill Chain Model
  • Diamond Model of Intrusion Analysis
  • Defining Rules of Engagement (RoE) & Legal Aspects
07 Reconnaissance and Gathering Intelligence
+

Focuses on intelligence gathering techniques (active/passive) using tools like theHarvester, Maltego, and Shodan.

  • Reconnaissance Methodology
  • Search Engines, DNS, Network and Email Recon
  • Social Engineering & OSINT
08 Scanning and Enumeration
+

Learn host discovery, port scanning, and vulnerability scanning using Nmap and Nessus. Covers evasion tactics for bypassing firewalls.

  • Types of Scanning & Tools
  • Host, Port, Service, and OS Discovery
  • Detect and Evade Defence
  • Enumeration Techniques: NetBIOS, SNMP, LDAP, SMTP, DNS, SMB
09 Vulnerability Analysis
+

Explains vulnerability classification, CVSS scoring, and scanning using Nessus, OpenVAS, and Nikto.

  • Vulnerability Classification & Scoring Systems
  • Vulnerability Management Phases
  • Vulnerability Scanning and Analysis
10 Exploitation
+

Learn how to exploit vulnerabilities to gain access using Metasploit, Mimikatz, and CrackMapExec.

  • Overview of Gaining Access
  • Microsoft Authentication & Privilege Escalation
  • Maintain Access & Covering Tracks
11 Social Engineering
+

Examines psychological and technical social engineering techniques like phishing using SET and ShellPhish.

  • Types of Social Engineering
  • Human-based, Computer-based, Mobile-based attacks
12 Network Level Attacks
+

Explore attacks on wired and wireless networks (ARP spoofing, DNS poisoning, WPA cracking) using Aircrack-ng and Bettercap.

  • Introduction to Network Attacks
  • Wired Network Attacks
  • Wireless Network Attacks
13 Web Attacks and Bug Hunting
+

Covers OWASP Top 10 vulnerabilities (SQL injection, XSS) using Burp Suite and Nikto. Introduces bug hunting.

  • Web Application Architecture & Components
  • Web Server & Application Attacks
  • Authentication, Authorization, & Injection Attacks
  • Understanding Bug Bounty
14 IoT and OT Exploitation
+

Explores security threats in IoT and Operational Technology. Hands-on exercises on IoT devices and SCADA systems.

  • OWASP Top 10 IoT Threats
  • IoT Attacking
  • Introduction to OT & Exploitation
15 Cloud Attacks
+

Focuses on cloud security threats, misconfigurations, and attacks targeting AWS, Kubernetes, and serverless computing.

  • Cloud, Fog, and Edge Computing
  • Container Technology (Docker, Kubernetes)
  • Serverless Computing & Cloud Threats
16 Reporting and Communication
+

Emphasizes the importance of effective communication, documenting findings, and crafting detailed reports.

  • Communication Triggers & Reporting Tools
  • Report Content Outline & Components
  • Best Practices for Reporting

Hands-on Labs & Cyber Range

  • Simulated Real-World Attacks: Train with real vulnerable devices and servers.
  • Tools & Techniques: Master Wireshark, Nmap, Metasploit, Burp Suite, PowerShell.
  • Live Security Ops: Participate in security monitoring and analysis.
> initializing_cyber_range...
> connecting to 192.168.1.X...
> running nmap -sC -sV target
> ...
> PORT STATE SERVICE
> 22/tcp open ssh
> 80/tcp open http
> 443/tcp open https
> VULNERABILITY DETECTED
> executing payload... ACCESS GRANTED

Career Pathways

Mapped to Cybersecurity Job Roles

Penetration Tester SOC Analyst Security Researcher Bug Bounty Hunter InfoSec Analyst Cyber Consultant