top of page
unnamed (12).jpg
dcbc08_8a06a169688a44799e796980a83d9a85~mv2 (1).png

HACKERS HUB

OUR COURSES

Whether you’re a beginner, student, IT professional, or career switcher, Hackers Hub offers all types of cybersecurity classes that help you enter and excel in one of the most in-demand tech fields today.

​

  • CCNA

  • Cyber Security and Ethical Hacking

  • MCSA – Microsoft Server 2025

  • Linux Administration

  • AWS – Cloud Services

Choose any 3 course @ 20000 + GST

1. Cyber Security

 Pre-Attack Phase

​

Mod1. Anatomy of Cyber Security

Mod2. Cyber Security Roles

Mod3. Introduction to Transformation of Data

Mod4. SOC Management Processes

Mod5. Footprinting (Information Gathering)

Mod6. Scanning and Enumerating Networks

Mod7. Analyzing Vulnerability

3. Attack Phase

​​

​​

​

Mod8. Endpoint Hacking

Mod9. Malware and Virus Attacks

Mod10. Sniffing Networks

Mod11. Social Engineering And Phishing.

Mod12. DoS, DDoS and Ransomware

Mod13. Session Hijacking And MITM Attack

Mod14. Defence Evasion Techniques (Firewall, IDS, Honeypots)

Mod15. Compromising Web Servers

Mod16. Hacking Web Applications

Mod17. Compromising Database using Sql Injection

Mod18. Hacking Mobile Platforms

Mod19. Hacking Wireless Networks

Mod20. Hacking IoT Devices

Mod21. Introduction to Cloud Computing

Mod22. Cryptography Techniques

Mod23. Introduction to Shell GPT and Automation in Cyber Security

4. Forensic Investigations

​

 

​

​​

 

 

 

Mod 1.  Introduction to Computer Forensics

Mod 2.  Endpoint Investigation Process.

Mod 3. Understanding Storage Devices (HDD,  SSD).

Mod 4. Introduction to different File Systems.

Mod 5. Data Acquisition and Duplication.

Mod 6. Anti-forensics Techniques.

Mod 7. Windows OS Forensics.

Mod 8. Linux OS and Mac OS Forensics.

Mod 9. Network Inspections.

Mod 10. Investigating Web Server Attacks.

Mod 11. Dark Web Investigations.

Mod 12. Database Investigations.

Mod 13. Cloud Investigations.

Mod 14. Email Crime Forensics.

Mod 15. Malware and Virus Forensics.

Mod 16. Mobile Forensics.

Mod 17. IoT Forensics.

5. AWS CLOUD

​

 

​

​

 

 

 

​

 

 

  1. To launch Linux EC2 Instance

1a. To connect to Amazon Linux instance from linux client operating system

1b. To connect to Amazon Linux instance from windows client operating system.

  1. To launch Windows EC2 instance in AWS

1a. To connect to Amazon Linux instance from linux client operating system

1b. To connect to Amazon Linux instance from windows client operating system.

  1. To configure webserver on Amazon on Linux instance with elastic IP.

  2. To assign Elastic IP address.

  3. To manage Elastic Block Store (EBS)

  4. To manage IAM users, Groups, and Policies.

  5. To configure Simple Storage Service (S3).

  6. To configure Versioning on S3

  7. To configure Static Website Using S3

  8. To configure Amazon Glacier.

  9. To configure Amazon Virtual  Private Cloud (VPC).

  1. To create your own VPC

  2. To create public cloud

  3. To create private subnet

  4. Create a Internet Gateway and attach to your VPC

  5. Create Public Routing Table, associate subnet and add routing rules

  6. Create Private Routing Table, associate subnet and add routing rules

  7. To launch Windows instance in Public Subnet

  8. To launch Windows instance in Private Subnet under PUNEVPC

  9. To connect public subnet instance

  10. To connect to private subnet instance

  11. To connect to linux instance in private subnet

  12. To connect to linux instance in private subnet

  1. To configure Amazon Cloudwatch

  2. To configure Amazon Simple Notification Service (SNS)

  3. To configure Amazon Elastic Load Balancer

  4. To configure Auto Scaling With Load Balancer

  5. To configure an Elastic Beanstalk with Tomcat Application

  6. To configure an Amazon Relational Database Service

  7. To configure Amazon DynamoDB

  8. To configure Amazon CloudFormation

  9. To configure Amazon Simple E-Mail Service (SES)

  10. To configure Amazon Simple QUEUE Service (SQS)

  11. To configure Amazon Route53

  12. To configure Amazon EFS Service

  13. To configure Amazon CloudFront Service

  14. Creating AMI

  15. CloudTrail

looo.jpg

Welcome

MCSE + Linux

dcbc08_8a06a169688a44799e796980a83d9a85~mv2 (1).png

The MCSE certification is recognized worldwide as the gold standard in IT certification. Our MCSE mapped course will give you a comprehensive understanding of Microsoft technologies and the ability to design, implement, and manage innovative solutions that drive business success.

With a focus on hands-on, practical training, our course covers key topics such as server infrastructure, cloud computing, network design, data management, and more. With our MCSE mapped course, participants can take their career to the next level and become experts in one of the most in-demand and rewarding areas of IT.

Our USP: All our classes are conducted LIVE with 100% Student Interaction. Our expert instructors have years of industry experience. Our world class courseware and labs ensure that the students gain hands on Practical Knowledge and are not limited to theory alone. Come, ZOOM with us into a networking career!

​

  • Network & Operating System Essentials

  • Installing and Configuring Windows Server 2012 R2 / 2016 / 2019 / 2022

  • Administering Windows Server 2012 R2 / 2016 / 2019 / 2022

  • Designing and Implementing Server Infrastructure

  • Configuring Windows Server 2012 R2 / 2016 / 2019 / 2022 Services​

​

Active Directory Domain Services

DNS, DHCP, IIS 10.0, VPN

​

  • Configuring File Server

    • File Server Resource Manager

    • Configuring Shared Resources 

​

  • Implementing Microsoft Virtualization Technologies

    • Server Virtualization using Hyper-V

 

  • Configuring Advanced Storage Solutions

    • iSCSI Target and Initiator

    • Storage Spaces and Storage Pools and RAID

 

  • Implementing Security Restrictions

    • Group Policies

    • Group Policy Preferences

​

​

Course Curriculum

Designed to develop strong Linux system administration skills required in enterprise IT and cloud environments.

​

Network Essentials

  • Networking Concepts, History of Server OS

  • Introduction to windows server 2012 R2 / 2016 / 2019 / 2022

  • Features of Windows Server 2019/2022

  • Installation of Windows Server 2019

  • Installation of Windows Server 2022

  • Installation of Windows 10

  • Introduction and Creation of Users accounts

  • Conversion of GUI to Server Core

  • Conversion of Server Core to GUI

​

​

Active Directory - Domain Services

  • IP Addressing Course Curriculum

​

​

Physical Structure of AD-DS

  • Introduction to Read-Only Domain

  • Logical Topologies - Peer-Peer & Domain Models

  • Introduction to Directory Services

  • Evolution of Active Directory Services - LDAP Protocol

  • Features of Active Directory

  • Installing Active Directory – Domain Controller

​

​

​

Member Servers, Clients, User Configuration

  • Configuring Member Servers and Clients

  • Creating Users in AD-DS

  • User Logon policies

  • Password policies

  • Account Lockout policies

  • User properties

​

​

​

​

Permissions / Access Control Lists

  • File Systems

  • Security and Sharing Permissions - Folders & Files

  • Configuring Map Network Drive

  • Access Based Enumeration

​

​

Profiles and File Server Resource Manager [FSRM]

  • Types of Profiles – Local & Roaming

  • Home Folder

  • Configuring Quotas using FSRM

  • Implementing File Screening using FSRM

  • Configuring Storage Reports Management

  • Introduction to Distributed File System

  • Creating Organisational Unit

  • Delegating Control to a User

​

​

Dynamic Host Configuration Protocol (DHCP)

  • Introduction and Configuration of DHCP Server

  • DHCP Client Configuration

  • Reservations

  • DHCP Backup and Configuring DHCP Failover

  • Configuring Forest Trusts between 2022 Forests

​

​

Domain Name System (DNS)

  • Internet Basics, Host & LM Host Files

  • DNS Naming Hierarchy

  • Lookup Zones - Forward and Reverse lookup Zones

  • Types of Zones – Primary, Secondary & Stub Zone

  • Resource Records, Integration with ADS, SRV Records

  • Forwarders, Dynamic Updates

​

​

Domain Name System (DNS)

  • Internet Basics, Host & LM Host Files

  • DNS Naming Hierarchy

  • Lookup Zones - Forward and Reverse lookup Zones

  • Types of Zones – Primary, Secondary & Stub Zone

  • Resource Records, Integration with ADS, SRV Records

  • Forwarders, Dynamic Updates

​

​

​

Internet Information Services (IIS)

  • IIS 10.0 Configuration

  • Hosting Websites, Virtual Directories

  • Redirecting Web Sites

  • Backup & Restoring Sites

  • FTP Sites

​

​

​

​

Windows Deployment Services

  • Introduction and Configuration of WDS Server

  • Attended and Unattended Installation

​

​

​

​

​

Microsoft Hyper-V

  • Installation of Hyper – V

  • Configuring Virtual Machine

  • Configuring Virtual Networks

  • Configuring Virtual Hard disks

  • Configuring Hyper-V Replica

​

​

​

Logical Structure of AD - DS

  • Configuring ADC

  • Tree Structure - Child Domain

Forest Structure

​

​

​

​

​

​

Remote Access Service

  • Remote Access Server Configuration

  • NAT and VPN - PPTP

​

​

​

FSMO Roles of AD - DS

  • Roles of AD - DS

  • Transferring of Roles

Seizing of Roles

​

​

​

​

​

​

​

Remote Desktop Services

  • Remote Administration Mode

​

​

​

​

Group Policy / System Policies

  • User and Computer Policies

  • Scope of Policies - OU, Domain, Sites

  • Group Policy Modeling (RSOP)

  • Software Deployment

  • Scripts, Folder Redirection

  • Group Policy Preferences

  • Auditing

​

​

​

​

​

​

​

​

Storage Technologies

  • Configuring iSCSI Target and Initiator

  • Introduction to Storage spaces and Storage Pools

  • Configuring Simple Volume (RAID – 0)

  • Configuring Mirror Volume (RAID – 1)

  • Configuring Parity Volume (RAID – 5)

​

​

​

​

​

Active Directory Trusts

  • Introduction to Trust Relationship

  • Categories, Directions & Types of Trusts

 

  • Functional Levels

  • Authentication Protocols Controller

  • Sites and Global Catalog

  • Replication between the Domain Controllers

  • AD-DS Partitions

  • Active Directory Recycle Bin

​

​

​

​

​

​

​

​

​

Failover Clustering

  • Configuring Failover on Hyper-V Virtual Machines

​

​

​

​

​

​

Advanced Topics

  • Windows Server Backup

  • Overview of AD-FS, LDS, RMS, CS

  • Upgrading Windows Server 2016 to 2019/2022

  • Configuring NLB cluster

  • Overview of NAP

unnamed (13).jpg

Linux Administrator

The Linux Administrator course is a comprehensive training program designed to provide IT professionals with the skills and knowledge needed to effectively manage Linux-based systems.

​

​​​​​This course covers a wide range of topics, including Linux installation and configuration, system administration, networking, security, and scripting. The program is intended for IT professionals who wish to deepen their expertise in Linux-based operating systems and learn best practices for managing Linux environments. Upon completion of the Linux course, participants will have gained the skills necessary to deploy and manage Linux-based systems, automate common administrative tasks, and troubleshoot issues that may arise in a Linux environment. With Linux being one of the most widely used operating systems in the world, this course is teaches essential Linux skills for IT professionals in many industries.

​

​​​​​Our USP: All our classes are conducted LIVE with 100% Student Interaction. Our expert instructors have years of industry experience. Our world class courseware and labs ensure that the students gain hands on Practical Knowledge and are not limited to theory alone. Come, ZOOM with us into a networking career!

​

​​​​​COURSE OUTLINE

​

​​​​​​

  • Introduction to Linux

  • Files and Directories Management

  • User and Group Administration

  • Permissions

  • Software Package Administration

  • NFS Server

unnamed (15).jpg

​

​​​​​COURSE CURRICULUM

​

​​​​​​

Introduction to Linux

  • History of Unix & Linux

  • Features of Linux

​

​​​​​​

​

User and Group Administration

  • Filtering Commands

  • Creating and Deleting Users From Systems

  • Creating and Deleting Groups

​

​​​​​​

​

​

Software Package Administration

  • Installing and Deleting Software Packages Using Rpm and Yum

  • Querying and Updating Software Packages

​

​​​​​​

Files and Directories Management

  • Fhs

  • Creating Files Using Cat

  • Touch Commands,

  • Modifying Using Vi/Vim Editors

  • Copying Files & Directories

  • Removing Files & Directories

​

​​​​​​

​

Permissions

  • Modifying & Verifying File Permissions Using Basic File Permissions

​

​​​​​​

​

​

Network File System (NFS)

  • Configuring NFS File Sharing Server

  • Mounting NFS Shared Folder From Client Systems

​

​​​​​​

  • 1.0            Network Fundamentals

  •     1.1       Explain the role and function of network components

  •                   1.1.a     Routers

  •                    1.1.b    L2 and L3 switches

  •                              1.1.c     Access points

  •                    1.1.d    Controllers (Cisco DNA Center and WLC)

  •                   1.1.e     Endpoints

  •                    1.1.f     Servers

  • 1.2          Describe characteristics of network topology architectures

  •                   1.2.a     2 tier

  •                    1.2.b    3 tier

  •                   1.2.c     Spine-leaf Architecture

  •                    1.2.d    WAN

  •                              1.2.f      On-premises and cloud

  • 1.9          Compare IPv6 address types

  •                   1.9.a     Global unicast

  •                    1.9.b    Unique local

  •                   1.9.c     Link local

  •                    1.9.d    Anycast

  •                    1.9.e     Multicast

  •                   1.9.f     Modified EUI 64

  • 1.11        Describe wireless principles

  • 1.11.a Nonoverlapping Wi-Fi channels

  • 1.11.b SSID

  • 1.11.c RF

  • 1.11.d Encryption

  • 1.12        Explain virtualization fundamentals (virtual machines)

  • 1.13        Describe switching concepts

  • 1.13.a MAC learning and aging

  • 1.13.b Frame switching

  • 1.13.c Frame flooding

  • 1.13.d MAC address table

  • 20%                       2.0            Network Access

  •     2.1       Configure and verify VLANs (normal range) spanning multiple switches

  •                   2.1.a     Access ports (data and voice)

  •                    2.1.b    Default VLAN

  •                   2.1.c     Connectivity

  • 2.2          Configure and verify interswitch connectivity

  •                   2.2.a     Trunk ports

  •                    2.2.b    802.1Q

  •                   2.2.c     Native VLAN

  • 2.3          Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)

  • 2.4          Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)

  • 2.5          Describe the need for and basic operations of Spanning Tree Protocol and identify basic operations

  •                   2.5.a     Root port, root bridge (primary/secondary), and other port names

  •                    2.5.b    Port states (forwarding/blocking)

  •                   2.5.c     PortFast benefits

  • 2.6         Compare Cisco Wireless Architectures and AP modes

2.7

Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk ports)

2.8

Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console, and TACACS+/RADIUS)

2.9

Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, and advanced WLAN settings

25%

3.0

IP Connectivity

 

3.1

Interpret the components of routing table

3.1.a     Routing protocol code

3.1.b    Prefix

3.1.c     Network mask

3.1.d     Next hop

3.1.e     Administrative distance

3.1.f     Metric

3.1.g     Gateway of last resort

3.5

Describe the purpose of first hop redundancy protocol

 

10%

4.0

IP Services

 

4.1

Configure and verify inside source NAT using static and pools

 

4.2

Configure and verify NTP operating in a client and server mode

 

 

4.3

Explain the role of DHCP and DNS within the network

 

        4.4

               Describe the use of syslog features including facilities and levels

 

        4.5

              Configure and verify DHCP client

 

  •  

        4.6

             Configure network devices for remote access using SSH

 

 

 

        4.7         

            Describe the capabilities and function of TFTP/FTP in the network

 

15%

5.0

Security Fundamentals

 

5.1

Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)

 

5.2

Describe security program elements (user awareness, training, and physical access control)

 

5.3

Configure device access control using local passwords

 

5.4

Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)

 

5.5

Describe remote access and site-to-site VPNs

 

5.6

Configure and verify access control lists

 

5.8

Differentiate authentication, authorization, and accounting concepts

 

5.9

Describe wireless security protocols (WPA, WPA2)

 

5.10

Configure WLAN using WPA2 PSK using the GUI

  •               5.11      Configuring Command Automation using DNA Centre

Blue Textured Background

Connect With Us On:

dcbc08_8a06a169688a44799e796980a83d9a85~mv2 (1).png
  • LinkedIn
  • Facebook
  • Instagram

+91 9998047993

+91 9998046993

​

Reach out to us for any inquiries or assistance. We are here to support your journey in mastering cyber security.

​

​SF-202, Vini Apartment, N S Phadke Chowk, Sadashiv Peth Rd, beside Choudhary Bandhu, Mithaiwale, Sadashiv Peth, Pune, Maharashtra 411030

bottom of page