Courses Offered: SCJP SCWCD Design patterns EJB CORE JAVA AJAX Adv. Java XML STRUTS Web services SPRING HIBERNATE  

       

Cyber Security Course Details
 

Subcribe and Access : 5200+ FREE Videos and 21+ Subjects Like CRT, SoftSkills, JAVA, Hadoop, Microsoft .NET, Testing Tools etc..

Batch Date: Dec 3rd @8:00PM

Faculty: Mr. Shoaib Ahmed

Duration: 45 Days

Venue :
DURGA SOFTWARE SOLUTIONS,
Flat No : 202, 2nd Floor,
HUDA Maitrivanam,
Ameerpet, Hyderabad - 500038

Ph.No: +91 - 9246212143, 80 96 96 96 96

Syllabus:

Cyber Security

Topics:

  • Introduction to EthicalHacking
  • Virtualization (Installation and Management of VirtualMachines)
  • Basics concepts of Networking, Linux and Windowscommands
  • Windows server configuration (DNS and WebServer)
  • Footprinting andReconnaissance
  • ScanningNetworks
  • Enumeration
  • SystemHacking
  • Malwares (Virus, Worms, Trojans,Backdoors)
  • Malwares Advanced (Writing our own Keylogger and Backdoor usingPython)
  • Network Penetration Testing (Sniffing, MITM – ArpPoisoning)
  • Hacking WirelessNetworks
  • SocialEngineering
  • Denial of ServiceAttacks
  • Web Application PenetrationTesting
    • SQLInjection
    • Cross SiteScripting
    • Broken Authentication and SessionManagement
    • File UploadVulnerability
  • VulnerabilityAssessment
  • PenetrationTesting
  • Cryptography
  • ReverseEngineering
  • Internet of Things(IoT)
  • Hacking Mobile Phones (Android PenetrationTesting)

Topics:

  • Introduction to Web Applications and theirtechnologies
    • Cookies
    • Same Origin Policy (SOP) andCORS
    • Encodings, Encryption and muchmore.
  • Understanding HTTP, HTTPS and other importantprotocols
  • Setting up the LabEnvironment
  • Information Gathering on WebApplications
  • Enumerating WebApplications
  • Burp Suite in detail (From Basics toAdvanced)
  • Host Header InjectionAttack
  • Cross-Site Scripting Attacks in Depth (Reflected, Stored,DOM-Based)
  • SQL Injection Attacks inDepth
  • Finding HTML InjectionVulnerability
  • URL RedirectionAttacks
  • ParameterTampering
  • Insecure Session ManagementAttacks
  • Cross Site Request Forgery Attacks(XSRF)
  • Server-Side RequestForgery
  • XML External Entity Attacks(XXE)
  • Command InjectionVulnerability
  • File InclusionVulnerabilities
  • Sensitive Data Exposure Vulnerability or Finding CriticalFiles
  • Brute Forcing Dictionary Attacks on WebApplications
  • Using Automated tools for findingvulnerabilities
  • Post ExploitationAttacks