Snow
Forest
Mountains
Snow
Snow

Diploma in Advance Cyber Security

Diploma in Advanced Cyber Security Training in Kolkata

Diploma in Advanced Cyber Security Training in Kolkata course has designed by our experienced professional penetration testers. They had been working in this domain for last 15 years. This is the best certificate which will definitely help you to secure a good job in the space of cyber security. Indian Cyber Security Solutions provide the most comprehensive cyber security training frame work. After that you will be able to secure a job as a penetration tester or cyber security expert. Kolkata, more popularly known as the City of Joy, is the third-most productive metropolitan city of India. Though the city was a hub for manufacturing units after Independence, today information technology is a high-growth sector. If you are looking for Cyber Security certification training in Kolkata, then you should join Indian Cyber Security Solutions structured courses that are tailored keeping individuals and organizational needs in mind.

 

This training focuses on the core issues of cloud & network security. Starting from the basic and then core security problem faced by industry experts while working as a cyber security professional. Cyber Security process of protection of the access to files and directories in a computer network. Against hacking, misuse and unauthorized changes to the system. With employment of information security analysts projected to grow by 18 percent from 2016 to 2024. You will learn by Diploma in Advanced Cyber Security Training in Kolkata is the process about used to protection of the access to files. It is directories in a computer network against hacking, misuse and unauthorized changes to the system. Join us for the course and after that you can build your career in this domain. ICSS’s Diploma in Advanced Cyber Security Training in Kolkata is in-demand as they build awareness of best practices against various attacks.

 


Duration

24 Months - 2 Class per week

Course Fee

Rs. 1,13,000/- (Inclusive of All Taxes)

 

ENROLL NOW

 

 

Diploma in Advanced Cyber Security Training in Kolkata

 

Diploma in Advanced Cyber Security Course in Kolkata

Diploma in Advanced Cyber Security Course in Kolkata by Indian Cyber Security Solutions is in very high demand. It is a comprehensive cybersecurity course to learn the most effective steps to prevent attacks and detect adversaries with actionable techniques. ICSS provides course from cybersecurity professionals with foundational, intermediate, and advanced security skills through industry-leading certification courses. The program begins with introductory-level cybersecurity skills training. Then progresses to advanced cybersecurity technologies such as reverse engineering, penetration testing techniques, and much more. Diploma in Advanced Cyber Security Course in Kolkata has always been an important process. For every team in every business.

 

Diploma in Advanced Cyber Security Course in Kolkata by Indian Cyber Security Solutions is in very high demand. It is a comprehensive cybersecurity course to learn the most effective steps to prevent attacks and detect adversaries with actionable techniques. ICSS provides course from cybersecurity professionals with foundational, intermediate, and advanced security skills through industry-leading certification courses. The program begins with introductory-level cybersecurity skills training. Then progresses to advanced cybersecurity technologies such as reverse engineering, penetration testing techniques, and much more. Diploma in Advanced Cyber Security Training in Kolkata has always been an important process. For every team in every business. In recent years, cybersecurity has become vital in all organizations. This course will allow you to get practical experience of tools and techniques. This Cyber security Diploma courses teach professionals to spot vulnerabilities, fend off attacks, and immediately respond to emergencies.

 

 

Diploma in Advanced Cyber Security Course in Kolkata

 

 

Eligibility Criteria for the course

Students from any background can apply for this course. We provide 6 Months Hands-on training by Industry experts. They are real time hackers and currently working in this domain. Diploma in Network Security course will help you to develop your necessary skills required in the industry. You will able to secure a job as a penetration tester after that. Network security is the process about used to protection of the access to files. Directories in a computer network against hacking, misuse and unauthorized changes to the system. It is uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner. It can be assess the security posture of a target system. Securing a network requires a complex combination of hardware devices, such as routers, firewalls and anti-malware software applications. Grow your knowledge in this field by the course.

 

 

Classroom

Course Details:

In our diploma courses we will be covering:

Basic Python

Advanced Python

Machine Learning using Python

IoT

Android

Android Penetration Testing

Certified Ethical Hacker Training Module (CEHv10) / Ethical Hacking Professional Training Module (CEHP)

WAPT

 

Course Fee for Diploma in Advanced Cyber Security Training in Kolkata:

Classroom INR 1,13,000/– + 18% GST

Certificate

 

Course Duration:

24 months training program (2 Hours per class)

 

 

Diploma in Advanced Cyber Security Training Module

 

Basic Python Module:

Chapter I – Python Introduction

Lecture:1 What is Python
Lecture:2 Python History
Lecture:3 Python 2.x vs 3.x
Lecture:4 Features of python
Lecture:5 About Python Versions
Lecture:6 Applications of python

Chapter II – Installation of Python

Lecture:7 How to install Python
Lecture:8 Python Script mode
Lecture:9 Python GUI mode
Lecture:10 Python Interactive Mode
Lecture:11 Python In linux
Lecture:12 Linux Script mode
Lecture:13 Linux GUI mode
Lecture:14 How to Install IDLE in Linux
Lecture:15 How to set Path

Chapter III – Basics of Python

Lecture:16 Python “Hello World”
Lecture:17 How to Execute Python
Lecture:18 Variables in python
Lecture:19 Keywords in python
Lecture:20 Identifiers in python
Lecture:21 Literals in python
Lecture:22 Operators in python
Lecture:23 Comments in python

Chapter IV – Python Strings

Lecture:24 Accessing Strings
Lecture:25 Strings Operators
Lecture:26 Basic Operators.
Lecture:27 Membership Operators.
Lecture:28 Relational Operators.
Lecture:29 Slice Notation
Lecture:30 String Functions and Methods

Chapter V – Python Lists

Lecture:31 How to define list
Lecture:32 Accessing list
Lecture:33 Elements in a Lists
Lecture:34 List Operations
Lecture:35 Adding Lists
Lecture:36 Replicating lists
Lecture:37 List slicing
Lecture:38 Updating elements in a List
Lecture:39 Appending elements to a List
Lecture:40 Deleting Elements from a List
Lecture:41 Functions and Methods of Lists

Chapter VI – Python Tuples

Lecture:42 How to define tuple
Lecture:43 Accessing tuple
Lecture:44 Elements in a tuple
Lecture:45 tuple Operations
Lecture:46 tuple slicing
Lecture:47 Deleting tuple
Lecture:48 Functions and Methods of tuple

Chapter VII – Python Dictionary

Lecture:49 How to define dictionary
Lecture:50 Accessing Dictionary
Lecture:51 Updation
Lecture:52 Deletion
Lecture:53 Functions and Methods

Chapter VIII – Python Control Statement

Lecture:54 “If” in python
Lecture:55 “If else” in python
Lecture:56 “else if” in python
Lecture:57 “nested if” in python
Lecture:58 “for loop” in python
Lecture:59 “while loop” in python
Lecture:60 “break” in python
Lecture:61 “continue” in python
Lecture:62 “pass” in python

Chapter IX – Python Functions

Lecture:63 Defining a Function
Lecture:64 Invoking a Function
Lecture:65 return Statement
Lecture:66 Argument and Parameter
Lecture:67 Passing Parameters
Lecture:68 Default Arguments
Lecture:69 Keyword Arguments
Lecture:70 Anonymous Function
Lecture:71 Difference between Normal Functions and Anonymous Function
Lecture:72 Scope of Variable

Chapter X – Python Files I/O

Lecture:73 “print” statement
Lecture:74 Input from Keyboard

Chapter XI – File Handling

Lecture:75 Operations on Files
Lecture:76 Opening file
Lecture:77 closing file
Lecture:78 reading file
Lecture:79 writing file
Lecture:80 Modes of files
Lecture:81 Methods in files

Chapter XII – Python OOPs Concept

Lecture:82 Python OOPs Concepts
Lecture:83 Python Object Class
Lecture:84 Python Constructors
Lecture:85 Python Inheritance
Lecture:86 Multilevel Inheritance
Lecture:87 Multiple Inheritance

Chapter XIII – Python Modules

Lecture:88 Importing a Module
Lecture:89 Example of importing multiple modules
Lecture:90 How to use “from” import statement
Lecture:91 import whole module
Lecture:92 Built in Modules in Python
Lecture:93 Package

Chapter XIV – Python Exceptions

Lecture:94 What is Exception handling
Lecture:95 Declaring Multiple Exception
Lecture:96 Finally Block
Lecture:97 Raise an Exception
Lecture:98 Custom Exception

Chapter XV – Python Date

Lecture:99 Retrieve Time
Lecture:100 Formatted Time
Lecture:101 time module
Lecture:102 Calendar
Lecture:103 Calendar module

Chapter XVI – Python Network programming

Lecture:118 Basics of networking
Lecture:119 What is socket?
Lecture:120 How to make socket?
Lecture:121 socket methods
Lecture:122 creating server
Lecture:123 creating client
Lecture:124 creating echo server
Lecture:125 Python Internet modules
Lecture:126 Port scanner in python
Lecture:127 Creating Webserver

 

Advanced Python Module:

Module-1 Quick Review

Lecture 1: Data Types

Lecture 2: Exception in Python

Lecture 3: Function in Python

Lecture 4: Class in Python

Lecture 5: Modules in python

 

Module-2 Threading & Parameter Parsing

Lecture 1: Threading

Lecture 2: Argparse

Lecture 3: Build Windows application

 

Module-3 Socket Programming

Lecture 1:  Socket Basic

Lecture 2: Socket Client

Lecture 3: Socket Server

Lecture 4: Networking Concepts & Applications

 

Module-4 Network Packets & Web

Lecture 1:  Creating Http Server

Lecture 2: Fetching Web pages

Lecture 3: Packet Sniffing

 

Module-5 Creating Hacking & Forensic Tools

Lecture 1:  Port Scanner

Lecture 2: Keyboard Sniffer

Lecture 3: Ethernet Sniffer

Lecture 4: Wifi History Logger

 

Module-6 Shell Programming In python

Lecture 1: Reverse Shell in TCP

Lecture 2: Reverse Shell in HTTP

Lecture 3: Persistence Shell

 

Module-7 Web Hacking With Python

Lecture 1:  Making Phishing Framework

Lecture 2: Bypassing  2-Factor Authentication using Python

 

Machine Learning using Python Training Module:

Module 1:

  • Features of Python
  • Using the Python Interpreter 
    • Invoking the Interpreter
    • The Interpreter and Its Environment
  • Introduction to Anaconda
    • Anaconda Navigator
    • Anaconda Prompt
    • IPython Console
    • Jupyter qtconsole
    • Jupyter Notebook
    • Spyder
  • An Informal Introduction to Python
    • Using Python as a Calculator
    • First Steps Towards Programming
  • Control Flow Tools
    • if Statements
    • for Statements
    • The range() Function
    • break and continue Statements, and else Clauses on Loops
    • pass Statements
    • Defining Functions
    • More on Defining Function
    • Function special attributes
    • Coding Style

Module 2:

  • Data Structures
    • Lists
    • The del statement
    • Tuples and Sequences
    • Sets
    • Dictionaries
    • Looping Techniques
    • More on Conditions
    • Comparing Sequences and Other Types

Module 3:

  • Concept of Modules
    • Standard Modules
    • The dir() Function
    • Packages
  • Input and Output
    • Fancier Output Formatting
    • Reading and Writing Files

Module 4:

  • Object: properties and operations
  • Class as a blueprint for objects
  • Fields: Python convention for defining private fields
  • Constructors: overloading and chaining
  • Designing static properties, operations and blocks in Python
  • Special method names in a class and their uses (e.g. __new__, __del__, __str__ etc)

Module 5:

  • Single and multiple inheritance
  • Method overriding and polymorphism
  • Iterators
  • Generators
  • Generator Expressions
  • Errors and Exceptions
  • Syntax Errors
  • Exceptions
  • Handling Exceptions
  • Raising Exceptions
  • User-defined Exceptions
  • Defining Clean-up Actions
  • Predefined Clean-up Actions

Module 6:

  • Scipy and Numpy
    • The Basics
      • An example
      • Array Creation
      • Printing Arrays
      • Basic Operations
      • Universal Functions
      • Indexing, Slicing and Iterating
    • Shape Manipulation
      • Changing the shape of an array
      • Stacking together different arrays
      • Splitting one array into several smaller ones
    • Copies and Views
      • No Copy at All
      • View or Shallow Copy
      • Deep Copy
      • Functions and Methods Overview
    • Broadcasting rules
    • Fancy indexing and index tricks
      • Indexing with Arrays of Indices
      • Indexing with Boolean Arrays
      • The ix_() function
      • Indexing with strings
    • Linear Algebra
      • Simple Array Operations
    • Tricks and Tips
      • “Automatic” Reshaping
      • Vector Stacking
      • Histograms

 

Module 7:

  • Basics of Pandas
    • Introduction to Pandas Data Structures
      • Series
      • DataFrame
      • Index Objects
    • Essential Functionality
      • Reindexing
      • Dropping entries from an axis
      • Indexing, selection and filtering
      • Arithmetic and data alignment
      • Function application and mapping
      • Sorting and ranking
      • Axis indexes and duplicate values
    • Summarizing and Computing descriptive statistics
      • Correlation and Covariance
      • Unique values, Value Counts and  Membership
    • Handling missing data
      • Filtering out missing Data
      • Filling out missing Data
    • Hierarchical Indexing
      • Reordering and sorting levels
      • Summary statistics by level
      • Using a dataframe’s column
    • Other Pandas topics
      • Integer indexing
      • Panel Data

Module 8:

Machine learning vs Statistical Modelling & Supervised vs Unsupervised Learning

  • Machine Learning Languages, Types, and Examples 
  • Machine Learning vs Statistical Modelling
  • Supervised vs Unsupervised Learning 
  • Supervised Learning Classification 
  • Unsupervised Learning 

Module 9:

Supervised Learning I

  • K-Nearest Neighbours
  • Decision Trees 
  • Random Forests
  • Reliability of Random Forests 
  • Advantages & Disadvantages of Decision Trees 

 

 Module 10:

Supervised Learning II

  • Regression Algorithms 
  • Model Evaluation 
  • Model Evaluation: Overfitting & Underfitting
  • Understanding Different Evaluation Models 

 Module 11:

Unsupervised Learning

  • K-Means Clustering plus Advantages & Disadvantages 

Project Implementation

 

IoT Training Module:

  • Introduction to IoT
  • Role of IoT in Data Analytics
  • Application of IoT & Data Analytics
  • SMART CITY
  • Hospital
  • Real Estate
  • Security System (Bank, Manufacturing)
  • Defense and Aviation
  • Disaster Management – Mining, etc.
  • Architecture of both the Raspberry Pi and the Sensors.
  • Sensors (Temperatue, Pressure, Humidity, Motion, etc.)
  • Communication Protocols of IoT
  • Essentials of Python Programming for IOT & Data Analytics
  • Essential concept on Big Data Platform in the context of IoT
  • Programming Raspberry Pi using Python
  • Connecting sensors over IoT
  • Loading/ Storing IoT generated data into remote Big Data Platform
  • Transmitting, receiving and retrieving data from IoT to different IT platforms (Local Spreadsheet, RDBMS, Big Data, Cloud, etc.)
  • Building/ Resolving End-to-End application that involves IoT & Data Analytics

 

Android Training Module:

Lesson 01 – Introduction to Android Development

1.1 Android Introduction

1.2 Android Architecture

1.3 Android Installation

1.4 Launching Android Studio / Eclipse

1.5 Android Project Structure

1.6 Android Manifest XML

1.7 Activity LifeCycle

1.8 Toast

1.9 Broadcast Receiver

 

Lesson 02 – Android UI Layout

2.1 How to Create Layout

 

Lesson 03 – Android UI Control

– Text View

– Edit Text

– Button

– Checkbox

– Toggle Button

– Radio button

– Radio Group

– Progress Bar

– Spinner

– Time Picker

– Date Picker

 

Lesson 04 – Android Activity and Intents and Service

4.1 Activity Lifecycles

4.2 Intents

4.3 Services and Life cycle ( Basic )

 

Lesson 05 – Fragment

5.1 Fragment Lifecycles

5.2 How to use fragment ( Basic )

 

Lesson 06 – Database

6.1 SQL Lite Database ( Basic )

6.2 Insert. Update, Delete task using database ( Basic )

 

Lesson 07 – Listview & RecyclerView

7.1 Populate listview

7.2 Populate Recylerview

 

Lesson 08 – Multimedia Audio and video & camera

8.1 Media Playback

8.2 Camera

8.3 Video playback

 

Lesson 09 – Content Providers

9.1 Contact Provider ( Basic )

 

Lesson 10 – Location and Google Map

10.1 Getting a Current Location ( Basic )

10.2 Using Maps with Location ( Basic )

10.3 Google API key ( Basic )

 

Lesson 11 – REST API integration (JSON)

11.1 JSON Parse ( Basic )

11.2 Asynctask  ( Basic )

 

Lesson 12 – Generate APK file

12.1 Build APK file  ( Not signed )

 

Lesson 13 – Build.gradle

13.1 What is build.gradle ( Basic )

13.2 compile other libraries ( Basic )

 

Project Task

  • Create Android Application on specific topic

 

 

Android Penetration Testing Training Module:

 

Lesson 1: Introduction To Android Security

Android is a Linux kernel mobile platform. Android runs on a wide range of devices, from mobile smartphones and tablets, to set-top boxes. The Android mobile operating system is dependent upon the mobile device’s processer capabilities for its performance.

 

Lesson 2: Creating a Suitable Penetration Testing Environment

  • Introduction To Custom ROMs And Kernels
  • Introduction to Bootloaders and Recoveries
  • CWM and TWRP
  • Flashing custom Recoveries
  • Flashing custom ROMs and Kernels
  • Introduction to CyanogenMod, AOSP, AOKP and other Android projects

 

Lesson 3: Application dynamic run-time analysis

  • Monitoring process activity
  • Observing file access
  • Monitoring network connectivity
  • Analyzing logs
  • Run time instrumentation and manipulation
  • Memory modification for running applications

 

Lesson 4: Traffic analysis and manipulation

  • Common Vulnerabilities Related to Traffic
  • Proxies and sniffers
  • Sensitive information transmission
  • Importing SSL certificates & trusted CA’s
  • Bypassing server certificate validations
  • Exposing insecure traffic
  • Validating server certificates and avoiding man-in-the-middle
  • Client side certificate authentication

 

Lesson 5: Pentesting Server-side Communication

  • Common app-to-server vulnerabilities
  • Proxies vs Transparent Proxies
  • Installing Trusted CA on an Android device
  • Performing fuzzing on the Application Server
  • Testing for conventional vulnerabilities server-side (Eg. SQLi, XSS, CSRF, Cookie Hijacking etc)

 

Lesson 6: Android Malware

  • Students will be provided an Android malware sample to test and decompile and analyze
  • Android malware apk testing to decrypt communication
  • Providing Source-code of a second Android malware for manual modification and compiling
  • Identifying connection strings and API calls

 

Lesson 7: Penetration Testing with Android

  • Setting up various tools and security suites to facilitate penetration testing with an Android device
  • Packet sniffing and DOS attacks on Android
  • ARP Spoofing on Android devices

 

Lesson 8: Vulnerability scanners

Lesson 9: Maintaining anonymity on an Android device

Lesson 10: Network Pentesting using Android devices

Lesson 11: Web Application attack techniques on Android

Lesson 12: Running Kali tools within Android devices

 

 

Certified Ethical Hacker Training (CEHv10) Module:

 

Chapter 1 – Introduction to Ethical Hacking

    • What is Hacking
    • What is Ethical Hacking
    • Types of Hackers
    • White Hat Hacker
    • Black Hat Hackers
    • Gray Hat Hackers
    • Script Kiddies
    • Hacktivists
    • Spy Hackers
    • Cyber Terrorists
    • Vulnerability
    • Exploit
    • Remote Exploit
    • Local Exploit
    • Zero-day
    • 0-day vulnerability
    • Zero-day Exploit
    • Brute force attack
    • Phishing
    • Remote access
    • Payload

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 2 – Steps of Ethical Hacking Information Gathering

  • Active Information Gathering
  • Passive Information Gathering
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 3 – Types of Malicious files

  • Viruses
  • Worms
  • Trojan Horse
  • Spyware
  • Adware
  • Backdoor
  • Rootkits
  • Ransomware

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 4 –  Penetration Testing

  • What is Penetration Testing
  • Types of Penetration Testing
  • What is white box Penetration Testing
  • What is Black Box Penetration testing
  • Introduction to Linux OS
  • Social Engineering

100 Marks Internal Exam ( Practical or article submission )

Chapter 5 – Google Hacking Using Dorks Demo

Lab Setup

  • What is Virtual Machine
  • What’s VMware
  • What is Virtual Box
  • Installing VMware
  • Install Kali Linux
  • Installing Windows XP
  • Install Windows 7
  • Install Add on in Mozila
  • Tamper Data
  • Burp Suite
  • No-Redirect
  • Install Nessus

 

Chapter 6 – System Hacking

  • System Hacking using Kon-Boot
  • Network Scanning
  • Port Scanning
  • Service Scanning
  • What is Nmap
  • Scanning With Nmap
  • Nmap Various Command

 

Chapter 7 – Scanning With Nessus Hacking With Metasploit

  • What is Metasploit?
  • Xp Remote Exploit using Metasploit
  • Msfvenom
  • Windows7 UAC Bypass

 

Chapter 8 – What is SE-Toolkit

  • SE-Toolkit Usages
  • Create Phishing page with SE-Toolkit
  • Hacking Facebook & Gmail password

 

Chapter 9 – What is Remote Administration Tool

  • What is RAT
  • Exploit With RAT
  • Protect System from RAT

 

Chapter 10 – What is Sniffing

  • Types of Sniffing
  • Network Sniffing with Wireshark
  • Get FTP Login Details Using Wireshark

 

Chapter 11 – What is DOS

  • Details of DOS
  • What is DDOS

 

Chapter 12 – Wireless Network Hacking

  • Wireless Encryption
  • Hacking WPA 2

 

Chapter 13 – Web Application Pen-testing

  • How Web Application Works
  • Request and Response
  • Installing Scanner (Acunetix,Netsparker)
  • Scanning Website

 

Chapter 14 – OWASP Top 10

  • What is Sql-Injection?
  • Types of Sql-Injection
  • Live Demo on Sql-Injection

 

Chapter 15 – What is XSS

  • Types of XSS
  • Live Demo on XSS All types

 

Chapter 16 – What is CSRF

  • Live Demo On CSRF What is HTML Injection
  • Live Demo on HTML Injection

 

Chapter 17 – What is Directory Listing

  • Live Demo on Directory Listing What is Broken Auth
  • Demonstration on Broken Auth What is Tamper data?
  • Live Demo on Tamper Data on Ecommerce site
  • Session Hijacking

 

Chapter 18 – What is Phishing?

  • Create a Phishing Page What is Web Shell
  • Hack Web-Server Using Web-Shell

 

Chapter 19 – Hacking Android Phone using Metasploit Question and Answer Class

 

Chapter 20 – Project

 

 

Ethical Hacker Professional (CEHP) Training Module:

 

Chapter 1 – Introduction to Ethical Hacking

    • What is Hacking
    • What is Ethical Hacking
    • Types of Hackers
    • White Hat Hacker
    • Black Hat Hackers
    • Gray Hat Hackers
    • Script Kiddies
    • Hacktivists
    • Spy Hackers
    • Cyber Terrorists
    • Vulnerability
    • Exploit
    • Remote Exploit
    • Local Exploit
    • Zero-day
    • Zero-day vulnerability
    • Zero-day Exploit
    • Brute force attack
    • Phishing
    • Remote access
    • Payload

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 2 – Steps of Ethical Hacking Information Gathering

  • Active Information Gathering
  • Passive Information Gathering
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 3 – Types of Malicious files

  • Viruses
  • Worms
  • Trojan Horse
  • Spyware
  • Adware
  • Backdoor
  • Rootkits
  • Ransomware

100 Marks Internal Exam ( Practical or article submission )

 

Chapter 4 –  Penetration Testing

  • What is Penetration Testing
  • Types of Penetration Testing
  • What is white box Penetration Testing
  • What is Black Box Penetration testing
  • Introduction to Linux OS
  • Social Engineering

100 Marks Internal Exam ( Practical or article submission )

Chapter 5 – Google Hacking Using Dorks Demo

Lab Setup

  • What is Virtual Machine
  • What is VMware
  • What is Virtual Box
  • Install VMware
  • Install Kali Linux
  • Install Windows XP
  • Install Windows 7
  • Install Add on in Mozila
  • Tamper Data
  • Burp Suite
  • No-Redirect
  • Install Nessus

 

Chapter 6 – System Hacking

  • System Hacking using Kon-Boot
  • Network Scanning
  • Port Scanning
  • Service Scanning
  • What is Nmap
  • Scanning With Nmap
  • Nmap Various Command

 

Chapter 7 – Scanning With Nessus Hacking With Metasploit

  • What is Metasploit?
  • Xp Remote Exploit using Metasploit
  • Msfvenom
  • Windows7 UAC Bypass

 

Chapter 8 – What is SE-Toolkit

  • SE-Toolkit Usages
  • Create Phishing page with SE-Toolkit
  • Hacking Facebook & Gmail password

 

Chapter 9 – What is Remote Administration Tool

  • What is RAT
  • Exploit With RAT
  • Protect System from RAT

 

Chapter 10 – What is Sniffing

  • Types of Sniffing
  • Network Sniffing with Wireshark
  • Get FTP Login Details Using Wireshark

 

Chapter 11 – What is DOS

  • Details of DOS
  • What is DDOS

 

Chapter 12 – Wireless Network Hacking

  • Wireless Encryption
  • Hacking WPA 2

 

Chapter 13 – Web Application Pen-testing

  • How Web Application Works
  • Request and Response
  • Installing Scanner (Acunetix,Netsparker)
  • Scanning Website

 

Chapter 14 – OWASP Top 10

  • What is SQL-Injection?
  • Types of SQL-Injection
  • Live Demo on SQL-Injection

 

Chapter 15 – What is XSS

  • Types of XSS
  • Live Demo on XSS All types

 

Chapter 16 – What is CSRF

  • Live Demo On CSRF What is HTML Injection
  • Live Demo on HTML Injection

 

Chapter 17 – What is Directory Listing

  • Live Demo on Directory Listing What is Broken Auth
  • Live Demo on Broken Auth What is Tamper data?
  • Live Demo on Tamper Data on Ecommerce site
  • Session Hijacking

 

Chapter 18 – What is Phishing?

  • Create a Phishing Page What is Web Shell
  • Hack Web-Server Using Web-Shell

 

Chapter 19 – Hacking Android Phone using Metasploit Question and Answer Class

 

Chapter 20 – Project

 

 

Web Application Penetration Testing Training Module:

 

Lesson 1: HTTP Basics

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web.

 

Lesson 2: OWASP (Open Web Application Security Project)

The Open Web Application Security Project is an online community which creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.

 

Lesson 3: Sql Injection

SQL injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server (also commonly referred to as a Relational Database Management System – RDBMS). Since an SQL injection vulnerability could possibly affect any website or web application that makes use of an SQL-based database, the vulnerability is one of the oldest, most prevalent and most dangerous of web application vulnerabilities.

 

Lesson 4: Cross Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF) is an attack outlined in the OWASP Top 10 whereby a malicious website will send a request to a web application that a user is already authenticated against from a different website. This way an attacker can access functionality in a target web application via the victim’s already authenticated browser. Targets include web applications like social media, in-browser email clients, online banking and web interfaces for network devices.

 

Lesson 5: Cross-site Scripting (XSS)

Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts (also commonly referred to as a malicious payload) into a legitimate website or web application. XSS is amongst the most rampant of web application vulnerabilities and occurs when a web application makes use of unvalidated or unencoded user input within the output it generates.

 

Lesson 6: Command Injection

Command injections are prevalent to any application independently of its operating system that hosts the application or the programming language that the application itself is developed. The impact of command injection attacks ranges from loss of data confidentiality and integrity to unauthorized remote access to the system that hosts the vulnerable application.

 

Lesson 7: Directory traversal

The web server is configured to display the list of files contained in this directory. This is not recommended because the directory may contain files that are not normally exposed through links on the web site.

 

Lesson 8: Input Validation

Input Validation is the outer defensive perimeter for your web application. This perimeter protects the core business logic, processing and output generation. Beyond the perimeter is everything considered potential enemy territory which is…literally everything other than the literal code executed by the current request.

 

Lesson 9: Information leakage

Information Leakage is an application weakness where an application reveals sensitive data, such as technical details of the web application, environment, or user-specific data. Sensitive data may be used by an attacker to exploit the target web application, its hosting network, or its users.

 

Lesson 10: Click-Jacking

Clickjacking attacks are an emerging threat on the web. In this paper, we design new clickjacking attack variants using existing techniques and demonstrate that existing clickjacking defenses are insufficient. Our attacks show that clickjacking can cause severe damages, including compromising a user’s private webcam, email or other private data, and web surfing anonymity.

 

Lesson 11: Web Application Security Controls

  • Application Security – Overview
  • Treat Modeling
  • Hacker’s Approach
  • Practical Considerations
  • Case Study

 

Lesson 12: Exploitation and Information Gathering Tools

  • Burp Suite
  •  Sqlmap
  • Acunetix
  • Archini
  • W3af
  • Browser Exploitation Framework (BeEF)

 

 

 

Gradation System: (on total marks obtained)

E Excellent Performer (90% – 100% marks)
A+ (80% – 89% marks)
A (70% – 79% marks)
B+ (60% – 69% marks)
B (50% – 59% marks)
C (not qualified – reappear all the modules)

 


Duration

24 Months - 2 Class per week

Course Fee

Rs. 1,13,000/- (Inclusive of All Taxes)

 

Get a Call from us




Week End BatchWeek Days (Mon & Fri) BatchWeek Days (Tue & Thu Batch)


8 AM-10 AM10 AM-12 PM12 PM-2 PM2 PM-4 PM4 PM-6 PM6 PM-8 PM

 

Why Choose Indian Cyber Security Solutions ?

 

  • Get trained from IT experts & Ethical Hackers with 10 years of experience.
  • Certificate recognized by government and private organizations in more than 160 countries.
  • 100 % placement assistance
  • Life time access to our online library “ HACKERS LAB ” containing case studies, video tutorials, interview questions.

 

 

Highest Selling Technical Courses of Indian Cyber Security Solutions:

Certified Ethical Hacker Training in Bhubaneswar

Ethical Hacking Training in Bhubaneswar

Certified Ethical Hacker Training in Bangalore

Ethical Hacking Training in Bangalore

Certified Ethical Hacker Training in Hyderabad

Ethical Hacking Training in Hyderabad

Ethical Hacking Training in Dhanbad

Certified Ethical Hacker Training in Dubai

Ethical Hacking Training in Dubai

Placement

Python Programming Training in Bangalore

C|PP Training in Hyderabad

Python Training in Bhubaneswar

Azure Training in Hyderabad

Microsoft Azure Training in Bangalore