dots bg

FRCD – Front Runner Cybersecurity Diploma

A 6-month SOC-focused cybersecurity diploma designed to develop hands-on skills in threat detection, log analysis, and incident response. Includes CST and ASA certifications, with EC-Council add-ons like CEH (Lite/Elite) and CSA.

Course Instructor Skillpod Admin

₹59500.00

To enroll in this course, please contact the Admin
dots bg

Course Overview

Schedule of Classes

Course Curriculum

4 Subjects

CST+CEH (ENG)

20 Exercises47 Learning Materials

CST+CEH MODULE 1: Fundamentals of Networks

Fundamentals of Network

Video
00:32:24

Fundamentals of Network : Module Notes

PDF

Module 1: Assessment

Exercise

CST+CEH MODULE 2 - Introduction to Ethical hacking

Introduction to Ethical Hacking - Part 1

Video
01:06:12

Introduction to Ethical hacking - Part 2

Video
00:00:00

Introduction to Ethical hacking : Module Notes

PDF

Module 2 - Assessment

Exercise

CST+CEH MODULE 3 - Secure Network Protocols

Secure Network Protocols

Video
00:33:43

Secure Network Protocols : Module Notes

PDF

Module 3 - Assessment

Exercise

CST+CEH MODULE 4 - Linux for Hackers

Linux for hackers

Video
00:31:46

Linux for hackers : Module Notes

PDF

Module 4 - Assessment

Exercise

CST+CEH MODULE 5 - Footprinting and Reconnaissance

Footprinting and Reconnaissance (Part 1)

Video
00:43:10

Footprinting and Reconnaissance (Part 2)

Video
00:31:21

Footprinting and Reconnaissance : Module Notes

PDF

Module 5 - Assessment

Exercise

CST+CEH MODULE 6 - Scanning Network Enumeration

Scanning Network Enumeration (Part 1)

Video
00:29:27

Scanning Network Enumeration (Part 2)

Video
00:15:12

Scanning Network Enumeration : Module Notes

PDF

Module 6 - Assessment

Exercise

CST+CEH MODULE 7 - Vulnerability Analysis, Penetration Testing and Malware Threats

Vulnerability Analysis, Penetration Testing and Malware Threats

Video
00:23:38

Vulnerability Analysis and Penetration testing : Module Notes

PDF

MODULE 7 - Assessment

Exercise

CST+CEH MODULE 8 - System Hacking

System Hacking

Video
00:18:13

System Hacking : Module Notes

PDF

Module 8 - Assessment

Exercise

CST+CEH MODULE 9 - Hacking Mobile Platforms

Hacking Mobile platforms

Video
00:27:00

Hacking Mobile Platforms : Module Notes

PDF

Module 9 - Assessment

Exercise

CST+CEH MODULE 10 - Malware Threats

Malware Threats

Video
00:28:37

Malware Threats : Module Notes

PDF

Module 10 - Assessment

Exercise

CST+CEH MODULE 11 - Sniffing

Sniffing (Part 1)

Video
00:20:44

Sniffing (Part 2)

Video
00:24:28

Sniffing : Module Notes

PDF

Module 11 - Assessment

Exercise

CST+CEH MODULE 12 - Wireless Security

Wireless Security (Part 1)

Video
00:53:36

Wireless Security (Part 2)

Video
00:08:30

Wireless Security (Part 3)

Video
00:12:31

Wireless Security : Module Notes

PDF

Module 12 - Assessment

Exercise

CST+CEH MODULE 13 - Denial of Service (DoS) Attacks

Denial of service (DoS) attacks

Video
00:19:42

Denial of Service (DoS) Attacks

PDF

Module 13 - Assessment

Exercise

CST+CEH MODULE 14 - Session Hijacking

Session hijacking

Video
00:19:26

Session Hijacking : Module Notes

PDF

Session Hijacking - Assessment

Exercise

CST+CEH MODULE 15 - Evading IDS, Firewalls and Honeypots

Evading IDS, Firewalls and Honeypots

Video
00:27:32

Evading IDS, Firewalls, and Honeypots : Module Notes

PDF

Module 15 - Assessment

Exercise

CST+CEH MODULE 16 - Hacking Web Server

Hacking Web Servers

Video
00:09:26

Hacking Web Server : Module Notes

PDF

Module 16 - Assessment

Exercise

CST+CEH MODULE 17 - Hacking Web Applications

Hacking Web Application (Part 1)

Video
00:11:14

Hacking Web Application (Part 2)

Video
00:13:10

Hacking Web Applications : Module Notes

PDF

Module 17 - Assessment

Exercise

CST+CEH MODULE 18 - Cryptography

Cryptography

Video
00:00:00

Cryptography : Module Notes

PDF

Module 18 - Assessment

Exercise

CST+CEH MODULE 19 - IOT Hacking

IOT Hacking

Video
00:04:00

IOT Hacking : Module Notes

PDF

Module 19 - Assessment

Exercise

CST+CEH MODULE 20 - Cloud Computing

Cloud Computing

Video
00:06:43

Cloud Computing : Module Notes

PDF

Module 20 - Assessment

Exercise

ASA/CSA (ENG)

22 Learning Materials

ASA Module 1 - Security Operations and Management

Security Operations and Management (Part 1)

Video
00:43:52

Understanding SOC Operations and SOP Workflow (Part 2)

Video
00:27:56

Security Operations & Management : Module Notes

PDF

ASA Module 2 - Understanding Cyber Threats, IoCs and Attack Methodology

IoCs and Attack Methodology

Video
00:10:58

Understanding Cyberthreat

Video
00:26:52

Understanding Cyber Threats, IoCs and Attack Methodology : Module Notes

PDF

ASA Module 3 - Incidents, Events & Loggings

Incidents, Events & Loggings

Video
00:09:54

Incident, Events & Loggings : Module Notes

PDF

ASA Module 4 - SPLUNK

SPLUNK, INSTALLATION TO SIEM ARCHITECTURE AND ITS COMPONENTS

Video
00:16:47

SPLUNK, INSTALLATION TO SIEM ARCHITECTURE AND ITS COMPONENTS

Video
00:16:47

SPLUNK : Module Notes

PDF

ASA Module 5 - Threat Intelligence

Fundamentals of Threat Intelligence

Video
00:09:32

How Threat Intelligence enhance cyber security

Video
00:13:06

Understanding Threat Intelligence

Video
00:32:30

Threat Intelligence : Module Notes

PDF

ASA Module 6 - Incident Response

Incident response (Part 1)

Video
00:15:44

Incident response (Part 2)

Video
00:09:35

Incident response (Part 3)

Video
00:09:35

Incident response (Part 4)

Video
00:08:53

Incident response (Part 5)

Video
00:12:49

Incident response (Part 6)

Video
00:12:16

Incident Response : Module Notes

PDF

CST+CEH (MAL)

20 Exercises54 Learning Materials

CST+CEH MODULE 1: Fundamentals of Networks

Fundamentals of Network

Video
00:32:24

Fundamentals of Network : Module Notes

PDF

Module 1: Assessment

Exercise

CST+CEH MODULE 2 - Introduction to Ethical hacking

Introduction to Ethical Hacking

Video
01:06:12

Introduction to Ethical hacking : Module Notes

PDF

Module 2 - Assessment

Exercise

CST+CEH MODULE 3 - Secure Network Protocols

Secure Network Protocols (Part 1)

Video
00:33:43

Secure Network Protocols (Part 2)

Video
00:47:01

Secure Network Protocols : Module Notes

PDF

Module 3 - Assessment

Exercise

CST+CEH MODULE 4 - Linux for Hackers

Linux for hackers (Part 1)

Video
00:31:46

Linux for hackers (Part 2)

Video
00:25:02

Linux for hackers : Module Notes

PDF

Module 4 - Assessment

Exercise

CST+CEH MODULE 5 - Footprinting and Reconnaissance

Footprinting and Reconnaissance (Part 1)

Video
00:43:10

Footprinting and Reconnaissance (Part 2)

Video
00:31:21

Footprinting and Reconnaissance : Module Notes

PDF

Module 5 - Assessment

Exercise

CST+CEH MODULE 6 - Scanning Network Enumeration

Scanning Network Enumeration (Part 1)

Video
00:29:27

Scanning Network Enumeration (Part 2)

Video
00:15:12

Scanning Network Enumeration (Part 3)

Video
00:24:18

Scanning Network Enumeration : Module Notes

PDF

Module 6 - Assessment

Exercise

CST+CEH MODULE 7 - Vulnerability Analysis, Penetration Testing and Malware Threats

Vulnerability Analysis, Penetration Testing and Malware Threats

Video
00:23:38

Vulnerability Analysis and Penetration testing : Module Notes

PDF

MODULE 7 - Assessment

Exercise

CST+CEH MODULE 8 - System Hacking

System Hacking (Part1)

Video
00:18:13

System Hacking (Part 2)

Video
00:17:23

System Hacking : Module Notes

PDF

Module 8 - Assessment

Exercise

CST+CEH MODULE 9 - Hacking Mobile Platforms

Hacking Mobile platforms

Video
00:27:00

Hacking Mobile Platforms : Module Notes

PDF

Module 9 - Assessment

Exercise

CST+CEH MODULE 10 - Malware Threats

Malware Threats

Video
00:21:34

Malware Threats : Module Notes

PDF

Module 10 - Assessment

Exercise

CST+CEH MODULE 11 - Sniffing

Sniffing (Part 1)

Video
00:54:31

Sniffing (Part 2)

Video
00:23:21

Sniffing : Module Notes

PDF

Module 11 - Assessment

Exercise

CST+CEH MODULE 12 - Wireless Security

Wireless Security (Part 1)

Video
01:07:40

Wireless Security (Part 2)

Video
00:09:45

Wireless Security (Part 3)

Video
00:09:35

Wireless Security (Part 4)

Video
00:08:32

Wireless Security : Module Notes

PDF

Module 12 - Assessment

Exercise

CST+CEH MODULE 13 - Denial of Service (DoS) Attacks

Denial of service (DoS) attacks

Video
00:21:35

Denial of Service (DoS) Attacks

PDF

Module 13 - Assessment

Exercise

CST+CEH MODULE 14 - Session Hijacking

Session hijacking

Video
00:29:32

Session Hijacking : Module Notes

PDF

Session Hijacking - Assessment

Exercise

CST+CEH MODULE 15 - Evading IDS, Firewalls and Honeypots

Evading IDS, Firewalls and Honeypots (Part 1)

Video
00:35:19

Evading IDS, Firewalls, and Honeypots (Part 2)

Video
00:00:00

Evading IDS, Firewalls, and Honeypots : Module Notes

PDF

Module 15 - Assessment

Exercise

CST+CEH MODULE 16 - Hacking Web Server

Hacking Web Servers

Video
00:21:46

Hacking Web Server : Module Notes

PDF

Module 16 - Assessment

Exercise

CST+CEH MODULE 17 - Hacking Web Applications

Hacking Web Application (Part 1)

Video
00:39:20

Hacking Web Application (Part 2)

Video
00:11:41

Hacking Web Application (Part 3)

Video
00:13:31

Hacking Web Application (Part 4)

Video
00:53:09

Hacking Web Applications : Module Notes

PDF

Module 17 - Assessment

Exercise

CST+CEH MODULE 18 - Cryptography

Cryptography

Video
00:22:34

Cryptography : Module Notes

PDF

Module 18 - Assessment

Exercise

CST+CEH MODULE 19 - IOT Hacking

IOT Hacking

Video
00:21:44

IOT Hacking : Module Notes

PDF

Module 19 - Assessment

Exercise

CST+CEH MODULE 20 - Cloud Computing

Cloud Computing

Video
00:16:25

Cloud Computing : Module Notes

PDF

Module 20 - Assessment

Exercise

ASA/CSA (MAL)

20 Learning Materials

ASA Module 1 - Security Operations and Management

Security Operations & Management

Video
00:43:52

Security Operations & Management : Module Notes

PDF

ASA Module 2 - Understanding Cyber Threats, IoCs and Attack Methodology

Understanding Cyberthreat

Video
00:26:52

Understanding Cyberthreat : Module Notes

PDF

ASA Module 3 - Incidents, Events & Loggings

Understanding incidents, events and logs

Video
00:09:54

Understanding incidents, events and logs : Module Notes

PDF

ASA Module 4 - SPLUNK

SPLUNK, INSTALLATION TO SIEM ARCHITECTURE AND ITS COMPONENTS

Video
00:28:38

SIEM Capabilities and Different Type of SIEM Solution

Video
00:23:22

SPLUNK : Module Notes

PDF

ASA Module 5 - Threat Intelligence

Module 5.1 Fundamentals of Threat Intelligence

Video
00:07:59

Module 5.2 Sources of Threat Intelligence

Video
00:09:48

Module 5.3 Sources of Threat Intelligence

Video
00:08:52

Module 5.4 Threat Intelligence Platforms

Video
00:19:31

Module 5.5 Integration of Threat intelligence to security operations

Video
00:23:36

Threat Intelligence : Module Notes

PDF

ASA Module 6 - Incident Response

INCIDENT RESPONSE Part1

Video
00:40:29

INCIDENT RESPONSE Part 2

Video
00:38:41

INCIDENT RESPONSE Part 3

Video
00:18:46

INCIDENT RESPONSE Part 4

Video
00:30:02

Incident Response : Module Notes

PDF

Course Instructor

tutor image

Skillpod Admin

12 Courses   •   154 Students