Cyber Camp

LEARN TODAY
PAY WHEN YOU GET
THE JOB

Become an all-round cyber security engineer with zero upfront cost.

1000+

Students Empowered

10

Months of Training

250+

Hiring Partners

120+

Lab Assignments

Give Your Career A Lift

Cyber Camp by hackers guru gives you an opportunity to learn and acquire industry required cyber security skills.

Learn From The Best

Learn from the team of cyber security researchers and hackers. Get in-depth knowledge and skills by working on live projects.

Career Aimed Courses

Training courses designed as per the industry standards and requirements. Delivered by professionals having 8+ years of rich experience.

Pay Nothing Until You Make it

Zero Upfront Fees. Choose not to pay until you get a job and start paying only when you get a job of minimum ₹5LPA.

Our HIRING PARTNERS

About the Cyber camp

Academic Background – The only academic criterion to apply for this program is that you should be graduate or pursing your graduation. No other degree/experience is required for this program.

Proficiency in English – This course is conducted in English, hence you should be able to follow instructions in English. We assess for your English communication when you apply.

Full-Time Availability – It is a very intensive course, and requires your full-time commitment. Our Lectures, Practice sessions, Mentoring & discussions sessions run full day from 9:00 AM to 5:00 PM. Also, between 9:00 AM and 5:00 PM, Monday to Friday, you will be engaged with HackersGuru, however, that’s not all, you will have to put extra time & efforts after 5:00 PM and on weekends too for your self-study and practice.

Amenities Requirement : computer / laptop with minimum 8GB of RAM and 100GB of free storage with an active Internet connection.

There are two payment options that a learner can choose from. Based on the option chosen, the amount paid by a learner will differ.

  • Option 1One-Time Fee – Student pays at the beginning of the course, a fixed fee of ₹100,000 + 18% GST. No additional amount needs to be paid after this at any stage of the program or after completion. You can also opt for Easy EMI options.
  • Option 2Zero Upfront Fees – Pay nothing at the time of admission and after getting a job of ₹5 LPA start paying 15% of your salary amount till next 36 months or upto ₹300,000/-.
We have a well-thought and well-defined admission process so that we only get the highly motivated and deserving people in the course. It is defined step by step as follows:
  1. Apply on the website: www.hackersguru.in/apply and complete the application process. 
  2. Once you complete the above step, we will evaluate your application and if you are eligible and qualified, then, you will get a call from Counselling & Admission Team at Hackers Guru to understand your career needs and guide you further in the process.
  3. If you qualify the above step 2, you sign an admission letter for joining the Value Selection Process which is of 1 weeks duration.
  4. If you qualify the Value Selection Process, then, you will be contacted by the admission team to get admission in the Cyber Camp of 10 months.
Value Selection Process is a trailer/introduction of the Main Course. It is of 1 weeks duration.
It serves two purposes –
1) Gives you a hands-on exposure of what the main track is going to be like.
2) Helps Hackers Guru identify who the dedicated students are going to be.
Once the Value Selection Track is finished, we select the deserving candidates for the Cyber Camp of 10 months. This selection is done based on efforts put up by the candidates and their performance in the Value Selection Process.

Yes, you have to pay Value Selection Process fee of Rs 500/-

Contact us

  • +91 810 315 1091

Learning path

icon cyber secutiry

Introduction To Cyber Security

Hackers Guru Introduction to Cyber Security course is designed to give you a foundational look at today’s cyber security landscape and show you how to evaluate and manage security protocol in information processing systems. You will learn about information security concepts and technologies, the principles behind security architecture, how to mitigate vulnerabilities and threats to your systems, and how to implement risk and incident management to protect your infrastructure from cyber attack.

module 1

Linux is an operating system that works just like Windows and Mac OS X. As an operating system, Linux manages your Linode’s hardware and provides services your other software needs to run.

Linux is a very hands-on operating system. If running Windows is like driving an automatic, then running Linux is like driving a stick. It can take some work, but once you know your way around Linux, you’ll be using the command line and installing packages like a pro.

Introduction to Networking Concepts. Networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software. You’ll be learning about network in detail.

TCP/IP is a standard protocol used for every network including the Internet, whereas, OSI is not a protocol but a reference model used for understanding and designing the system architecture. TCP/IP is a four-layered model, whereas, OSI has seven layersTCP/IP follows Vertical approach. Sounds Interesting? We will learn more and make it more interesting during the class with live labs setup.

module 2

WEB APPLICATION PENETRATION TEST

Web application penetration testing is the process of using penetration testing techniques on a web application to detect its vulnerabilities. It is similar to a penetration test and aims to break into the web application using any penetration attacks or threats.

  • The evolution of web
  • Understanding the web
  • Introduction to TCP/IP
  • Web hackers toolkit
  • HTTP Protocol
  • HTTP Status Code
  • HTTPS Protocol
  • Cookies
  • URL Encoding
  • Web Sockets
  • OWASP testing guide
  • PCI Penetration testing guide
  • Penetration Testing Execution Standard
  • NIST 800-115
  • Penetration Testing Framework
  • Information Systems Security Assessment Framework (ISSAF)
  • Open Source Security Testing Methodology Manual (“OSSTMM”)
  • FedRAMP Penetration Test Guidance
  • CREST Penetration Testing Guide
  • Information gathering
  • Network Scanning
  • DNS Harvesting & whois
  • Opensource Intelligence
  • Web spidering
  • Interception proxies
  • Discovering hidden content
  • Analysing the application
  • Mapping the Attack Surface
  • Testing application configuration
  • Identifying configuration flaws
  • Shellshock & Heartbleed
  • Testing weak ciphers
  • Identifying information leakage
  • Authentication technologies
  • Design flaws in authentication
  • Authentication testing
  • Username Harvesting
  • Session tracking
  • Session fixation
  • Bypass Flaws
  • Vulnerable web app
  • Command injection
  • File inclusion attacks (LFI/RFI)
  • SQL injection
  • SQL injection tools
  • Introduction to java script
  • Type of XSS
  • XSS attacks in action
  • Finding & exploitation
  • XSS vulnerabilities
  • BeEF framework
  • Cross site request forgery
  • Logic attacks
  • Python for hackers
  • WPScan & W3AF
  • Metaspolit framework
  • Introduction to reporting
  • Effective report writing

module 3

network tedst

NETWORK PENETRATION TEST

Penetration testing, also called pen testing or ethical hacking, is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually.

  • Definitions
  • Pentest Methodology
  • Approach
  • Reconnaissance Tools
  • Network Scanning Tools
  • Exploitation Framework
  • Querying Web & Search Engines
  • WhoIs Lookup
  • DNS Querying
  • BGP Querying
  • Recon-ng
  • Automating Enumeration
  • Network Sniffing
  • Network Tracing
  • Port Scanning
  • OS Fingerprinting &
  • Version Gathering
  • Vulnerability Scanning
  • Network Packet Crafting
  • IDS Evasion & Filter Circumvention
  • AV Evasion
  • Low Level IP Assessment
  • Enumerating Users
  • Netcat For Hackers
  • Introduction to Metaspolit
  • Metaspolit AV Evasion
  • Integration of Tools in Metaspolit
  • Command Shell
  • Terminal Access
  • Accessing DNS Service
  • Accessing Auth Service
  • Accessing SSL/Telnet
  • Accessing LDAP/AD
  • Accessing Web Servers
  • Accessing Microsoft SQL
  • Accessing Oracle / MySql
  • John The Ripper
  • Cain & Able
  • Rainbow Table Attack
  • Pass The Hash Attack
  • Accessing & Moving Files using Exploits
  • Pilfering From Target Machine
  • Windows Command Line
  • Making Windows Execute Commands Remotely
  • Accessing Windows Services
  • Powershell for Hackers

module 4

soc

SOC ANALYST

An Organization's Perspective on SOC Analysts. Security analysts are, in many ways, the foot soldiers of the organization. Their job is to detect, investigate, and respond to incidents. They may also be involved in planning and implementing preventative security measures and in building disaster recovery plans.

  • Introduction
  • The 3 Principles of Cyber Security
  • The 3 States of Data
  • Cyber Security Countermeasures
  • Introduction to SOC
  • Current State Assessment
  • Adversarial Dominance
  • Traditional Cyber Attacks
  • Traditional Cyber Defense
  • Modern Cyber Threats
  • Client Side Attacks
  • Client Side Targets
  • Post Exploitation
  • Modern Cyber Defense Principles
  • Routers
  • Network Firewall
  • Web Application Firewall
  • Network IDS/IPS
  • Next Generation Firewall
  • Malware Detonation Devices
  • Forward Proxies
  • SIEM
  • Network Packet Capture Device
  • Adversary Deception Services
  • Threat Intelligence
  • NSM Overview
  • Evolution of NSM
  • The NSM Toolbox
  • NIDS Designs
  • Analysis Methodology
  • NSM Data Sources
  • Tracking EXEs
  • Identifying Command & Control Traffic
  • Tracking User Agents
  • C2 via HTTPS
  • Tracking Encryption Certificates
  • Windows Endpoint
  • Patching
  • Secure Baseline Configuration
  • EMET
  • Sysmon
  • Application Whitelisting
  • Privilege Monitoring
  • Privilege Reduction
  • Authentication
  • Post Authentication
  • Security Support Provider
  • Advance Authentication Attacks
  • Anti-malware
  • Endpoint Firewall
  • Host Based IDS/IPS
  • Industry Best Practices
  • CSM Techniques
  • Situational Awareness
  • Host & Service Discovery
  • Passive OS Detection
  • Vulnerability Scanning
  • Security Patch Monitoring
  • System Logs Monitoring
  • Monitoring Changes to Devices
  • Analyzing Firewall/Proxy Logs
  • Centralized Logging
  • Critical Events
  • Scripting & Automation

module 5

incedent

CYBER INCIDENT HANDLING

The Incident Response Analyst will be responsible for monitoring enterprise networks and systems, detecting events and reporting on any and all threats that are directed against those systems regardless of their classification level or type.

  • Risk Overview
  • Risk Policy
  • Risk Assessment
  • NIST’s Risk Assessment Methodology
  • Steps to Assess Risks at Work Place
  • Risk Analysis
  • Risk Mitigation
  • Cost/Benefit Analysis
  • NIST Approach for Control Implementation
  • Residual Risk
  • Risk Management Tools
  • Incident Handling Overview
  • Incident Handling Process
  • Preparation
  • Identification
  • Containment
  • Eradication
  • Recovery
  • Espionage
  • Unauthorized Use
  • Insider Threats
  • Intellectual Property Attacks
  • Legal Issues
  • Denial-of-Service Incidents
  • Distributed Denial-of-Service Attack
  • Detecting DoS Attack
  • Incident Handling Preparation for DoS
  • Network Traffic Monitoring Tools
  • Network Auditing Tools
  • Network Protection Tools
  • Incident Recovery
  • Principles of Incident Recovery
  • Incident Recovery Steps
  • Contingency/Continuity of Operations Planning
  • Business Continuity Planning
  • Incident Recovery Plan
  • Incident Recovery Planning Process
  • Incident Reporting
  • Why to Report an Incident
  • Why Organizations do not Report Computer Crimes
  • Whom to Report an Incident
  • How to Report an Incident
  • Details to be Reported
  • Preliminary Information Security Incident
  • Reporting Form
  • CERT Incident Reference Numbers
  • Summary of Hosts Involved
  • Description of the Activity
  • Log Extracts Showing the Activity
  • Federal Agency Incident Categories
  • Organizations to Report Computer Incident
  • Incident Reporting Guidelines

Frequently Asked Question

Hackers Guru Cyber Camp program is one of a kind Career Program designed to enhance your Cyber security skills. It takes you from being a Beginner to Job-ready in 10 months, and send you off on a path of a better job and higher earnings.

Any graduate or a final year student or working professional who is passionate about the cyber security and wants to build a career in infosec domain is eligible for the cyber camp.

Of course YES!!!

Industry needs skilled professionals not the people who holds a degree in the domain without any skills and knowledge.

There are two payment options that a learner can choose from. Based on the option chosen, the amount paid by a learner will differ.

  • Option 1 – One-Time Fee – Student pays at the beginning of the course, a fixed fee of ₹105,000 + 18% GST. No additional amount needs to be paid after this at any stage of the program or after completion.
  • Option 2Zero Upfront Fees – Pay nothing at the time of admission, complete the training and if you get the job of minimum ₹5 LPA you are liable to pay us 15% of your salary amount till next 36 months upto ₹300,000/-

We don’t feel that degree can be a substitute for your determination and passion in cyber world. However, we do expect you to have strong aptitude skills and basic Coding fundamentals. In any case, you can apply for the Screening Test ( Value Selection Process).

Yes. If you are applying for a certain company through us and the company has selected you, we expect you to not back out of it.

There is no compulsion to work and stay with a particular company. How long you decide to stay with a company totally depends on you. But it will not change your EMI payment commitments.

Job is the end result we all are working on together. We both will be working hard to up-skill you and prepare you. Even if you get a job through other channels, it will be considered a job only and all the conditions will be unchanged.

The course will be conducted Online and Offline both . It has been designed in such a manner that you will have all the Online Videos and other content with you which can be accessed from anywhere at any point in time.

In Offline mode you have to visit our training centre.

Timings will be told to you once you’re selected.