Subcribe and Access : 5200+ FREE Videos and 21+ Subjects Like CRT, SoftSkills, JAVA, Hadoop, Microsoft .NET, Testing Tools etc..
Batch
Date: Dec
3rd @8:00PM
Faculty: Mr. Shoaib Ahmed
Duration: 45 Days
Venue
:
DURGA SOFTWARE SOLUTIONS,
Flat No : 202,
2nd Floor,
HUDA Maitrivanam,
Ameerpet, Hyderabad - 500038
Ph.No: +91 - 9246212143, 80 96 96 96 96
Syllabus:
Cyber Security
Topics:
- Introduction to EthicalHacking
- Virtualization (Installation and Management of VirtualMachines)
- Basics concepts of Networking, Linux and Windowscommands
- Windows server configuration (DNS and WebServer)
- Footprinting andReconnaissance
- ScanningNetworks
- Enumeration
- SystemHacking
- Malwares (Virus, Worms, Trojans,Backdoors)
- Malwares Advanced (Writing our own Keylogger and Backdoor usingPython)
- Network Penetration Testing (Sniffing, MITM – ArpPoisoning)
- Hacking WirelessNetworks
- SocialEngineering
- Denial of ServiceAttacks
- Web Application PenetrationTesting
- SQLInjection
- Cross SiteScripting
- Broken Authentication and SessionManagement
- File UploadVulnerability
- VulnerabilityAssessment
- PenetrationTesting
- Cryptography
- ReverseEngineering
- Internet of Things(IoT)
- Hacking Mobile Phones (Android PenetrationTesting)
Topics:
- Introduction to Web Applications and theirtechnologies
- Cookies
- Same Origin Policy (SOP) andCORS
- Encodings, Encryption and muchmore.
- Understanding HTTP, HTTPS and other importantprotocols
- Setting up the LabEnvironment
- Information Gathering on WebApplications
- Enumerating WebApplications
- Burp Suite in detail (From Basics toAdvanced)
- Host Header InjectionAttack
- Cross-Site Scripting Attacks in Depth (Reflected, Stored,DOM-Based)
- SQL Injection Attacks inDepth
- Finding HTML InjectionVulnerability
- URL RedirectionAttacks
- ParameterTampering
- Insecure Session ManagementAttacks
- Cross Site Request Forgery Attacks(XSRF)
- Server-Side RequestForgery
- XML External Entity Attacks(XXE)
- Command InjectionVulnerability
- File InclusionVulnerabilities
- Sensitive Data Exposure Vulnerability or Finding CriticalFiles
- Brute Forcing Dictionary Attacks on WebApplications
- Using Automated tools for findingvulnerabilities
- Post ExploitationAttacks