Included Services
- 100% Placement Assistance
- 1,2,4 Hour Batches
- 500 GB Hacking Toolkit
- 1 Year Course Duration
Benifits of services
- 2 Year Membership
- Hindi or English Language
- Online and Offline Training
- 7+ Year Experience Trainer
1 Year Cyber Security Diploma course syllabus
- 🔶 Introduction to Networking
- • what is networking
- 🔶 Fundamentals of Networking
- 🔶 OSI Model v/s TCP/IP Model
- 🔶 MAC Address
- 🔶 IP Addressing
- • IPv4
- • IPv6
- 🔶 Subnetting
- 🔶 Network Cabling
- 🔶 Router Fundamentals
- 🔶 Lab Configuration on Packet Tracer
- 🔶 Router, Switch and PC Communication
- 🔶 Routing Protocols
- • Default Routing
- • Static Routing
- • Static Routing with Subnetting
- 🔶 Dynamic Routing
- • RIP
- • EIGRP
- • OSPF
- 🔶 DHCP
- 🔶 NAT (Network Address Translation)
- 🔶 V-LAN Configuration
- 🔶 ACL (Access Control List)
- 🔶 BGP Configuration
- 🟢 Online / Offline Training
- 🟢 Live Practical training
- 🟢 Training by experienced trainers
- 🟢 Checkpoint based training
- 🟢 Every session Recordings
- 🟢 Test After completion
- 🟢 24x7 Support
- 🔶 Linux Evolution and Popular Operating Systems
- • Introduction
- • Linux Distribution
- • Linux Embedded System
- • Hardware Requirement
- • Installing Linux
- • OS Differences
- 🔶 Open Software Application
- • What is an Open Source
- • Desktop and Server Application
- • Languages and Tools
- • Packages installs and repositories
- 🔶 The Linux Environments
- • Linux Desktop Environments
- • Linux Shell and Commands
- • Managing Softares Packages
- 🔶 The Command Line
- • Difference B/w Shells
- • Command Line
- • Command Usage
- • Man Pages
- 🔶 Directories And Files
- 🔶 Searching and extracting data from files
- 🔶 Packages Installation in Different Directory
- 🔶 User Account and Groups
- • Creating Account from the Shell
- • Modifying and Deleting Account
- • Working as Root
- 🔶 Managing file ownership and Permission
- 🟢 Online / Offline Training
- 🟢 Live Practical training
- 🟢 Training by experienced trainers
- 🟢 Checkpoint based training
- 🟢 Every session Recordings
- 🟢 Test After completion
- 🟢 24x7 Support
- 🔶 Introduction to Ethical Hacking
- 🔶 Reconnnaissance
- • Active Foot-Printing
- • Passive Foot-Printing
- • Finger Printing Active/Passive
- 🔶 Scanning Networks
- • Host Discovery
- • TCP/UDP Port Scanning
- • Vulnerability Scanning
- 🔶 Enumeration
- 🔶 System Hacking
- • Physical Access (Windows / Linux OS)
- 🔶 Malware & Threats
- • Virus / Worms
- • Trojan Horse
- • Ransomware
- • Polymorphic Virus
- • Macro Virus
- • Micro Virus
- • Rootkit, etc.
- 🔶 Social Engineering
- • Phishing Attacks
- • Vishing Attack, etc.
- 🔶 Denial of Service
- • DOS (Deial of Service)
- • DDOS (Distributed Denial of Service)
- 🔶 Session Hijacking
- 🔶 Wireless Hacking
- • WEP / WPA / WPA2 Wi-Fi Hacking
- 🔶 Mobile Hacking
- 🔶 Hacking Web-Application (with BurpSuite)
- 🔶 SQL Injection
- • Automatic tool based
- • Manual SQL Injection
- 🔶 Hacking Web Server
- 🔶 Sniffing / Sniffers
- • MITM Attack
- • DNS Attack
- • DHCP Attack
- • MAC Address Attack, etc.
- 🔶 IDS, Firewall, Honeypot
- 🔶 Cryptography
- 🔶 Basics of Cloud Computing / Hacking
- 🔶 IoT Hacking
- 🔶 Basics of Penetration Testing
- 🟢 Online / Offline Training
- 🟢 Live Practical training
- 🟢 Interview Questions
- 🟢 Test After completion
- 🔶 Introduction to Python
- 🔶 Environment Setup
- 🔶 Basic Syntax
- 🔶 Comments
- 🔶 Variables
- 🔶 Data Types
- 🔶 Operators
- 🔶 Division Making
- 🔶 Loops
- 🔶 Numbers
- 🔶 Strings
- 🔶 Lists
- 🔶 Tuples
- 🔶 Dictionary
- 🔶 Date & Time
- 🔶 Function
- 🔶 Modules
- 🔶 Files I/O
- 🔶 Exceptions
- 🟢 Online / Offline Training
- 🟢 Live Practical training
- 🟢 Training by experienced trainers
- 🟢 Checkpoint based training
- 🟢 Every session Recordings
- 🟢 Test After completion
- 🟢 24x7 Support
- 🔶 Introduction to Digital Forensics
- 🔶 Inevitability During Computer Forensics
- • Investigation, Maintaining Integrity, Chain of Custody,Write Blocker
- 🔶 OS Forensics
- • RAM Dump, Ram Dump Analysis
- 🔶 Investigation methodology and digital devices
- 🔶 Storage Media
- • Logical structure, GUID and partition table, File system
- 🔶 Network Forensics
- • Network protocols and investigating routers
- 🔶 Network Forensics Cont.
- 🔶 Malware
- • Analyzing malware
- 🔶 Memory Forensics
- • Memory forensics and analyzing volatile memory
- 🔶 Digital forensics tools
- • Creating and analyzing disk images
- • Recovering deleted data and craving files from unallocated space
- 🔶 Cryptanalysis
- • Encryptions and decryption tools, Forensics data analysis tools
- 🔶 Process of Investigation
- • Roles and responsibilities
- • Identifying and containing security breaches
- • Digital evidence collection and preservation
- • Incident investigation and reporting
- 🔶 Lab Sessions
- • Caine Installation
- • USB packer sniffer
- • Encryptions practical
- • Event viewer-windows forensics
- • Memory forensics
- • Mail forensics basics
- 🔶 Windows forensics
- 🔶 Dark web forensics
- 🔶 Cloud forensics
- 🔶 Email forensics
- 🔶 Mobile forensics
- 🟢 Online / Offline Training
- 🟢 Live Practical training
- 🟢 Training by experienced trainers
- 🟢 Checkpoint based training
- 🟢 Every session Recordings
- 🟢 Test After completion
- 🟢 24x7 Support
- 🔶 How to plan your Penetration Testing
- 🔶 Scoping your Penetration Testing
- 🔶 Network & Web-Application
- 🔶 Scanning Vulnerability
- • Port Scanning
- • Script scanning
- • Enumeration
- • Service & Version Scanning
- • Web-Application Scanning
- 🔶 Exploitation with Metasploit
- • Exploit Vulnerability
- • Bind & Reverse Shell
- • Payload Creation, etc.
- 🔶 Post-Exploitation
- 🔶 Pivoting Attack
- 🔶 Browser exploitation
- • BEEF Exploit
- 🔶 In-Depth Password Attacks
- • John the Ripper
- • Brute Force Attack
- • Dictionary Attack
- • Rainbow Table Attack
- • Other Password Cracking Tools
- 🔶 Crcking / Solving CTF's
- 🔶 Final Analysis
- 🔶 Final Report Generation
- • Manual Reporting
- • Automatic Reporting
- 🟢 Online / Offline Training
- 🟢 Live Practical training
- 🟢 Interview Questions
- 🟢 Test After completion
- 🔶 Introduction to Web-application Penetration-Testing
- 🔶 Finding Subdomains
- 🔶 Understanding HTTP
- 🔶 Access Control Flaws
- 🔶 Ajax Security
- 🔶 Authentication Flaws
- 🔶 Buffer overflaws
- 🔶 Code Quality
- 🔶 Concurrency Flaws
- 🔶 Cross Site Scripting
- 🔶 Improper Error Handling
- 🔶 Injection Flaws
- 🔶 Denail of Service
- 🔶 Insecure Communication
- 🔶 Insecure Configuration
- 🔶 Insecure Storage
- 🔶 Malicious File Execution
- 🔶 Parameter Tampering
- 🔶 Session Management Flaws
- 🔶 Challenge Online Platform
- 🟢 Online / Offline Training
- 🟢 Live Practical training
- 🟢 Interview Questions
- 🟢 Test After completion
- 🔶 Android Fundamentals
- 🔶 Introduction to Mobile-App Testing
- 🔶 Lab Setup
- 🔶 Android Architecture
- 🔶 APK File Structure
- 🔶 Reversing with APK tool / JADx-GUI
- 🔶 Reversing with MobSF
- 🔶 Static Analysis
- 🔶 Scanning Vulnerabilities with Drozer
- 🔶 Improper Platform Usage
- 🔶 Log Analysis
- 🔶 Insecure Storage
- 🔶 Insecure Communication
- 🔶 Hard Coding Issues
- 🔶 Insecure Authentication
- 🔶 Insufficient Cryptography
- 🔶 Code Tempering
- 🔶 Extraneous Functionality
- 🔶 SSL Pinning Attack
- 🔶 Intercepting The Network Traffic
- 🔶 Dynamic Analysis
- 🔶 Report Preparation
- 🟢 Online / Offline Training
- 🟢 Live Practical training
- 🟢 Interview Questions
- 🟢 Test After completion
- 🔶 Introduction
- 🔶 Introduction to IOS Apps
- 🔶 Challenges with IOS lab setup
- 🔶 Lab setup with jailbreaken IOS device
- 🔶 Setting up XCODE
- 🔶 Installing Apps in IOS device
- 🔶 Decrypting IOS applications
- 🔶 Introduction to SecureStorev2
- 🔶 Dumpping class information
- 🔶 Jailbreak detection bypass
- 🔶 IOS Traffic analysis
- 🔶 Introduction to Frida / Frida CLI
- 🔶 Frida Scripts to trace HTTP calls
- 🔶 Introduction to end-to-end Encryption
- 🔶 Introduction to hopper
- 🔶 Jailbreak detection using hopper
- 🔶 SSL pinning attack
- 🔶 Pentesting Local Data storage
- 🔶 Pentesting Uninteded Data Leakage
- 🔶 Pentesting client side injection
- 🔶 Traffic Analysis
- 🔶 RunTime Analysis
- 🔶 Network Attacks
- 🔶 Reporting
- 🟢 Online / Offline Training
- 🟢 Live Practical training
- 🟢 Interview Questions
- 🟢 Test After completion
- 🔶 Introduction
- 🔶 Information Gathering
- 🔶 BurpSuite Introduction
- 🔶 Cross Site Scripting (XSS)
- 🔶 Host Header Injection
- 🔶 URL Redirection
- 🔶 Parameter Tempering
- 🔶 HTML Injection
- 🔶 SQL Injection
- 🔶 File Inclusion
- 🔶 Missing SPF Record
- 🔶 No rate limiting
- 🔶 Source Code Discloser
- 🔶 Long Password Dos Attack
- 🔶 IDOR
- 🔶 Server Site Request Forgery (SSRF)
- 🔶 Cross Site Request Forgery (CSRF)
- 🔶 Hostile Subdomain Takeover
- 🔶 S3 Bucket Takeover
- 🔶 Command Injection (RCE)
- 🔶 File Uploading
- 🔶 XML External Entity Injection
- 🔶 Buffer Overflow
- 🔶 Wordpress Vulnerability
- 🔶 Joomla Vulnerability
- 🔶 Drupal Vulnerability
- 🔶 CMS Vulnerability Hunting
- 🔶 HSTS (HTTP Strict transport Security)
- 🔶 Session Fixation
- 🔶 Account Lookout
- 🔶 Password Reset Poisoning
- 🔶 Identity management test Testing
- 🔶 Authentication Testing
- 🔶 Cryptographic Vulnerability
- 🔶 Session Mangement Testing
- 🔶 Exposed Source Code Control System
- 🔶 Apache Structs RCE Hunting
- 🔶 Web Cache Deceptions
- 🔶 Server Side Includes injection
- 🔶 Ticket Tricks Bug Bounty
- 🔶 Multi-Factor Authentication
- 🔶 HTTPoxy Attack
- 🔶 Webmin Unauthentication bypass
- 🔶 HeartBleed
- 🔶 Appweb Authentication Bypass
- 🔶 Ngnix
- 🔶 MySQL Authentication Bypass
- 🔶 DMS Zone Transfer
- 🔶 Log Injection
- 🔶 Cache Testing
- 🔶 Black (Jinga-2) SSTI to RCE
- 🔶 Handloop Vulnerability
- 🔶 CSRF Same site bypass
- 🔶 JWT Token Attack
- 🔶 Email bounce resource
- 🔶 IVR Call Request Crash
- 🔶 Weak Password Reset
- 🔶 Business Login Vulnerabilities
- 🔶 RPC Ping Back Attack
- 🔶 WAF/ MOD Security Bypass
- 🔶 Broken Authentication
- 🔶 Open redirection
- 🔶 Null Byte Injection
- 🔶 CORS Vulnerabilities
- 🟢 Online / Offline Training
- 🟢 Live Practical training
- 🟢 Interview Questions
- 🟢 Test After completion
- 🔶 The IOT Security testing Overview
- 🔶 Case Study: Connected and Self-Driving
- 🔶 Vehicles Security
- 🔶 Case Study: Microgrids
- 🔶 Case Study: Smart City Drone System
- 🔶 IOT Hardware and Software
- 🔶 Communication and Messaging Protocols
- 🔶 IOT Interfaces and Services
- 🔶 Threats, Vulnerabilities and Risks
- 🔶 Case Study: The Mirai Botnet Opens Up
- 🔶 Pandora’s Box
- 🔶 Today’s Attack Vector
- 🔶 Current IOT Security Regulations
- 🔶 Current IOT Privacy Regulations
- 🔶 What is Threat Modeling
- 🔶 An Introduction to IOT Security Architectures
- 🔶 Identifying Assets
- 🔶 Creating a System Architecture
- 🔶 Documenting Threats
- 🔶 Rating Threats
- 🔶 IOT Privacy Concerns
- 🔶 Privacy By Design (PbD)
- 🔶 Conducting a Privacy Impact Assessments
- 🟢 Online / Offline Training
- 🟢 Live Practical training
- 🟢 80% Practical Training
- 🟢 20% Theory Training
- 🟢 Certificate after completion
- 🟢 Interview Questions
- 🟢 Test After completion
- 🔶 Cloud Computing with AWS Getting Started
- • Introduction to Cloud and AWS Advantages
- • Getting Started Learn Cloud Computing with AWS
- 🔶 AWS Getting Ready
- • Creating Your First IAM User
- 🔶 AWS Regions and Zones
- • Exploring Regions and Availability Zones in AWS
- • Understanding the Need for Regions and Zones
- 🔶 AWS Getting Started with Ec2
- • Creating Virtual Machines with Amazon Ec2
- • Setting up a Web Server in an Amazon EC2 Instance
- • EC2 Virtual Servers in AWS r>
- 🔶 AWS Exploring Compute Services
- • Playing with Lambda Functions
- • Playing with Amazon ECS
- • Playing with AWS Elastic Beanstalk
- • Exploring IaaS vs PaaS Cloud Computing with AWS
- • Exploring Container Orchestration in AWS
- • Setting up ECS Cluster with AWS Fargate
- • Creating Your First Lambda Function
- • Setting up Web Application with AWS Elastic Beanstalk
- • Understanding the Need for Docker and Containers
- • AWS Elastic Beanstalk
- 🔶 AWS Exploring Structured and Semi Structured Data
- • Creating Tables and Playing with Amazon RDS
- • Creating a NoSQL Database in AWS with Amazon DynamoDB
- • Amazon DynamoDB NoSQL Document and Key Value Da
- • Amazon RDS OLTP Relational Database in AWS
- • Exploring Semi Structured Data Key Value Graph and Column Family
- • Creating a Relational Database in AWS with Amazon RDS
- 🔶 AWS Exploring Unstructured Data Course
- • Object Storage with Amazon S3
- • Static Website with Amazon S3
- • Block Storage in AWS Elastic Block Store
- • Hybrid Storage in AWS Storage Gateway
- • Object Storage in AWS S3 and S3 Glacier
- • Getting Started with Unstructured Data
- • File Storage in AWS EFS
- • AWS Scenarios related to Data Stores
- • Block Storage in AWS EBS and Instance Store
- 🔶 AWS Exploring Security
- • John the Ripper
- • Brute Force Attack
- • Dictionary Attack
- • Rainbow Table Attack
- • Other Password Cracking Tools
- 🔶 AWS Exploring Private Networks
- • Creating Private Networks with VPC and Subnets
- • VPCs and Subnets
- • Connecting AWS with On premises DirectConnect and VPN
- • NAT Devices Enable Outbound Internet Access for Private SU
- • AWS Quick Review of Networking Services
- 🔶 AWS Digital Transformation and Managing Costs
- • Cloud Computing in AWS Managing Costs
- • AWS Services for Managing Costs
- • Understanding Digital Transformations and the role of Cloud
- 🟢 Online / Offline Training
- 🟢 Live Practical training
- 🟢 Interview Questions
- 🟢 Test After completion
Our Free Services
Blogs and News
You can read about the latest updates and tools for Cyber Security.
Learning Videos and Tutorials
You can read and watch the free videos about cyber security.