Back

CYBER WOLF

40 Days Basic Ethical Hacking Course

Foundation Program for Beginners in Cybersecurity

Provider: Cyber Wolf
www.cyberwolf.pro
cyberwolfofficials@gmail.com
Duration: 40 Days
Mode: Theory + Practical Labs

Total Days

40 Days

Total Weeks

8 Weeks

Daily Class

2 Hours

Skill Level

Beginner

Lab Access

Local + Hosted

Course Modules - 40 Day Plan
Week 1 (Day 1-5): Cybersecurity Basics and Environment Setup
Day Topic What You Learn Lab Type Practice
Day 1Introduction to Ethical HackingHacker types, legal boundaries, responsible disclosure, career overview.TheoryClass activity
Day 2Networking FundamentalsOSI, TCP/IP, ports, protocols, packet flow basics.Local LabNetwork mapping
Day 3Linux Basics for HackersLinux commands, file system, permissions, package management.Local LabKali setup
Day 4Windows Command Line and PowerShellCommand usage for administration and security checks.Local LabWindows hardening
Day 5Virtual Lab SetupVirtualBox/VMware setup, attacker and target machine setup.Local LabLab validation
Week 2 (Day 6-10): Reconnaissance and Scanning
DayTopicWhat You LearnLab TypePractice
Day 6Footprinting and OSINTWHOIS, DNS lookup, search engine reconnaissance.Hosted LabTarget profiling
Day 7Google DorkingFinding exposed files, admin pages, and data leaks.Hosted LabDork exercises
Day 8Nmap BasicsHost discovery, port scanning, service detection.Local LabPort scan report
Day 9Advanced Nmap and EnumerationNSE scripts, version detection, vulnerability scripts.Local LabService enumeration
Day 10Vulnerability Scanning IntroNikto and basic scanner workflow.Hosted LabWeb scan
Week 3 (Day 11-15): Web Application Fundamentals
DayTopicWhat You LearnLab TypePractice
Day 11HTTP/HTTPS and RequestsMethods, headers, cookies, sessions.TheoryTraffic analysis
Day 12Burp Suite Setup and ProxyIntercept, modify, and replay web requests.Hosted LabProxy lab
Day 13Authentication Testing BasicsWeak login, brute force understanding, lockout policy checks.Hosted LabLogin testing
Day 14Input Validation IssuesBasic SQLi and XSS concepts for beginners.Hosted LabPayload testing
Day 15Hands-on Mini ChallengeCombine recon and web basics to identify simple flaws.Hosted LabMini CTF
Week 4 (Day 16-20): Web Vulnerabilities Basics
DayTopicWhat You LearnLab TypePractice
Day 16SQL Injection BasicsError-based and basic authentication bypass testing.Hosted LabSQLi lab
Day 17Cross-Site Scripting BasicsReflected and stored XSS fundamentals.Hosted LabXSS lab
Day 18File Upload VulnerabilitiesUpload validation issues and unsafe extensions.Local LabUpload bypass
Day 19IDOR and Access Control BasicsBroken access checks and object manipulation.Hosted LabIDOR testing
Day 20Week AssessmentPractical assessment on covered vulnerabilities.Hosted LabAssessment
Week 5 (Day 21-25): System and Network Security Basics
DayTopicWhat You LearnLab TypePractice
Day 21Password Security and Cracking IntroHashing basics, weak passwords, dictionary attacks.Local LabHashcat basics
Day 22Wireshark Packet AnalysisCapture and inspect network traffic.Local LabPacket lab
Day 23MITM Concept and DefensesARP spoofing concept and secure mitigations.TheoryCase study
Day 24Firewall and IDS BasicsBasic filtering, logs, and alerts.Local LabRule simulation
Day 25Secure Configuration BasicsCommon misconfiguration checks in OS and services.Local LabChecklist audit
Week 6 (Day 26-30): Tools and Automation Basics
DayTopicWhat You LearnLab TypePractice
Day 26Burp Repeater and IntruderManual request manipulation and basic fuzzing.Hosted LabParameter fuzzing
Day 27Directory and Subdomain Discoveryffuf and subfinder beginner usage.Hosted LabDiscovery lab
Day 28Nuclei IntroTemplate-based vulnerability checks.Hosted LabNuclei scan
Day 29Bash/Python Automation BasicsCreate simple scripts for repetitive recon tasks.Local LabScript task
Day 30Toolchain Practice DayUse multiple tools in one beginner workflow.Hosted LabWorkflow exercise
Week 7 (Day 31-35): Reporting and Professional Workflow
DayTopicWhat You LearnLab TypePractice
Day 31Writing Good Bug ReportsTitle, steps to reproduce, impact, and recommendations.TheoryReport template
Day 32Proof of Concept DocumentationScreenshots, evidence, and reproducibility.TheoryPoC writeup
Day 33CVSS BasicsHow to estimate basic severity and impact.TheorySeverity practice
Day 34Bug Bounty Platform BasicsScope reading, program rules, and safe testing approach.Hosted LabScope analysis
Day 35Mock Triage SessionHow reports are accepted, duplicated, or rejected.TheoryTriage simulation
Week 8 (Day 36-40): Final Practical and Certification
DayTopicWhat You LearnLab TypePractice
Day 36Full Recon PracticalPerform complete beginner recon on provided target lab.Hosted LabRecon challenge
Day 37Web Testing PracticalTest authentication, IDOR, XSS, and basic SQLi.Hosted LabWeb challenge
Day 38System and Network PracticalPacket review and basic vulnerability checks.Local LabNetwork challenge
Day 39Final Report SubmissionCreate and submit final report with evidence and impact.TheoryFinal report
Day 40Final Assessment and CertificationCourse review, viva, and certification result.TheoryCompletion exam
Lab Availability
Evaluation Criteria
Component Type Weight Description
Weekly LabsPractical35%Completion and quality of weekly hands-on tasks.
Mid Practical TestPractical20%Week 4 skill validation.
Final PracticalPractical30%End-to-end ethical hacking exercise.
Final ReportDocumentation15%Professional report with proper evidence.