Cyber Security - Intermediate Level

Difficulty: ⭐️⭐️⭐️☆☆


This course introduces learners to an Intermediate level of Cyber Security – an emerging field in Information Technology due to the rapid changes of cyber world with cyber crimes and attacks. Through theoretical lectures and hands-on practice, students will learn the latest ethical hacking tools and techniques, how to perform passive/active information gathering for attacks, and how to perform various types of hacks and attacks (Buffer Overflow, Buffer Overflow Exploitation, Exploits,…).


  • Basic understanding and skills about Linux
  • Fundamental knowledge of computer networking
  • Basic Bash scripting skills

By the end of this course, students will achieve:

  • Intermediate Bash scripting skills
  • In-depth understanding and practices about Linux OS, network services, and essential packets analysis tools
  • In-depth understanding and practices on how to scan network vulnerabilities, passive/active information gathering for attacks   
  • Practical knowledge and be able to perform various types of hacks/attacks: Buffer Overflow, Buffer Overflow Exploitation on Linux and Window, Exploits

Curriculum For This Course

      1. Cyber Security Introduction – A closer look
      2. Kali Linux and how to manage its services (SSH, HTTP)
      3. Bash scripting with practical usages (intermediate)
      4. Essential tools: Netcat, Wireshark, Tcpdump
      1. Open Web information gathering (Google hacking)
      2. Email Harvesting
      3. Additional resources (Netcraft,…)
      1. DNS enumeration
        1. Interacting with a DNS server
        2. Automating lookups
        3. Forward Lookup Brute Force
        4. Reverse Lookup Brute Force
      2. Port scanning (intermediate)
        1. TCP/UDP/SYN scanning
        2. Port scanning with NMAP
        3. OS Fingerprinting
        4. Nmap Scripting Engine (NSE)
      1. SMB Enumeration
        1. Scanning for NetBIOS service
        2. Null Session Enumeration
        3. Nmap SMB NSE Scripts
      2. SMTP Enumeration
      3. SNMP Enumeration
        1. MIB Tree
        2. Scanning for SNMP
      1. Vulnerability scanning with NMAP
      2. Vulnerability scanning with OpenVAS
      1. Fuzzing
      2. DEP and ASLR
      3. Interacting with POP3 protocol
      1. Controlling EIP
      2. Locating Space for Your Shellcode
      3. Checking for Bad Characters
      4. Redirecting the Execution Flow
      5. Generating Shellcode with Metasploit
      6. Getting a Shell
      7. Improving the Exploit
      1. Crashing Crossfire
      2. Controlling EIP
      3. Finding Space for Our Shellcode
      4. Improving Exploit Reliability
      5. Discovering Bad Characters
      6. Finding a Return Address
      7. Getting a Shell
      1. Searching for Exploits: in Kali Linux vs. on the Web
      2. Customizing and Fixing Exploits
      1. Practice hacking with a simulating scenario
      2. An intermediate-level Test


Group name Start date Session duration Number of sessions Standard price


Below are the courses that you may want to take after this course:


Tokyo Techies Lecturer

Marlin Arnall

Cyber Security engineer and game enthusiast

Marlin is a passionate computer engineer with interest in cyber security. He has cultured a healthy paranoia about closed-source software, security threats, and data security. Marlin is very passionate about digital rights and protecting the open internet.

Ask him about how your devices can spy on you.