Diploma In Cyber Security Test

Diploma in Advanced Cyber Security Training in Kolkata

Diploma in Advanced Cyber Security Training in Kolkata course has designed by our experienced professional penetration testers. They had been working in this domain for last 15 years. This is the best certificate which will definitely help you to secure a good job in the space of cyber security. Indian Cyber Security Solutions provide the most comprehensive cyber security training frame work. After that you will be able to secure a job as a penetration tester or cyber security expert.

Kolkata, more popularly known as the City of Joy, is the third-most productive metropolitan city of India. Though the city was a hub for manufacturing units after Independence, today information technology is a high-growth sector. If you are looking for Cyber Security certification training in Kolkata, then you should join Indian Cyber Security Solutions structured courses that are tailored keeping individuals and organizational needs in mind.

This training focuses on the core issues of cloud & network security. Starting from the basic and then core security problem faced by industry experts while working as a cyber security professional. Cyber Security process of protection of the access to files and directories in a computer network. Against hacking, misuse and unauthorized changes to the system. With employment of information security analysts projected to grow by 18 percent from 2016 to 2024.

You will learn by Diploma in Advanced Cyber Security Training in Kolkata is the process about used to protection of the access to files. It is directories in a computer network against hacking, misuse and unauthorized changes to the system. Join us for the course and after that you can build your career in this domain. ICSS’s Diploma in Advanced Cyber Security Training in Kolkata is in-demand as they build awareness of best practices against various attacks.

The point of using dummy text for your paragraph is that it has a more-or-less normal distribution of letters. making it look like readable English.

Student Feedback

Online Live Training on Python Programming

No matter if you’ve used a visual page builder before, with Brizy you’ll be a pro the second you start using it.

No matter if you’ve used a visual page builder before, with Brizy you’ll be a pro the second you start using it.

Class Room Training on Python Programming

No matter if you’ve used a visual page builder before, with Brizy you’ll be a pro the second you start using it.

No matter if you’ve used a visual page builder before, with Brizy you’ll be a pro the second you start using it.

Eligibility Criteria for the Python Course in Kolkata

The point of using dummy text for your paragraph is that it has a more-or-less normal distribution of letters. making it look like readable English.

The point of using dummy text for your paragraph is that it has a more-or-less normal distribution of letters. making it look like readable English.

Why you should choose ICSS ?

Industry professions from Amazon, Cognizant & Intel will share their practical experience in the class

LIFETIME access to video tutorials, case studies

100% practical and lab-based classes (available online & offline)

EMI option is available if you go for 2 or more courses.

25% Scholarship program for merited students with a minimum of 90% marks in their board exams

Get educational loan @  O% interest

What kind of Jobs you can apply for after completing the Diploma In Advance Cyber Security Course

The point of using dummy text for your paragraph is that it has a more-or-less normal distribution of letters. making it look like readable English.

CHECK OUT CURRENT JOB OPENINGS IN POPULAR JOB PORTALS

No matter if you’ve used a visual page builder before, with Brizy you’ll be a pro the second you start using it.

No matter if you’ve used a visual page builder before, with Brizy you’ll be a pro the second you start using it.

Diploma in Advanced Cyber Security Course in Kolkata

Diploma in Advanced Cyber Security Course in Kolkata by Indian Cyber Security Solutions is in very high demand. It is a comprehensive cybersecurity course to learn the most effective steps to prevent attacks and detect adversaries with actionable techniques. ICSS provides course from cybersecurity professionals with foundational, intermediate, and advanced security skills through industry-leading certification courses. The program begins with introductory-level cybersecurity skills training. Then progresses to advanced cybersecurity technologies such as reverse engineering, penetration testing techniques, and much more. Diploma in Advanced Cyber Security Course in Kolkata has always been an important process. For every team in every business.

Diploma in Advanced Cyber Security Course in Kolkata by Indian Cyber Security Solutions is in very high demand. It is a comprehensive cybersecurity course to learn the most effective steps to prevent attacks and detect adversaries with actionable techniques. ICSS provides course from cybersecurity professionals with foundational, intermediate, and advanced security skills through industry-leading certification courses. The program begins with introductory-level cybersecurity skills training. Then progresses to advanced cybersecurity technologies such as reverse engineering, penetration testing techniques, and much more.

Diploma in Advanced Cyber Security Training in Kolkata has always been an important process. For every team in every business. In recent years, cybersecurity has become vital in all organizations. This course will allow you to get practical experience of tools and techniques. This Cyber security Diploma courses teach professionals to spot vulnerabilities, fend off attacks, and immediately respond to emergencies.

Diploma In Advance Cyber Security Course Module

Python Module

  • Chapter I –  Python Introduction
  • Chapter II – Installation Of Python
  • Chapter III – Basics Of Python
  • Chapter IV – Python Strings
  • Chapter V – Python Lists
  • Chapter VI – Python Tuples
  • Chapter VII – Python Dictionary
  • Chapter VIII – Python Control Statement 
  • Chapter IX – Python Functions 
  • Chapter X – Python Files I/O
  • Chapter XI – File Handling 
  • Chapter XII – Python OOPs Concept 
  • Chapter XII – Python Modules
  • Chapter XIV – Python Exceptions
  • Chapter XV – Python Date
  • Chapter XVI – Python Network Programming
Chapter I –  Python Introduction

Lecture:1 What is Python

Lecture:2 Python History

Lecture:3 Python 2.x vs 3.x

Lecture:4 Features of python

Lecture:5 About Python Versions

Lecture:6 Applications of python

Chapter II – Installation Of Python

Lecture:7 How to install Python

Lecture:8 Python Script mode

Lecture:9 Python GUI mode

Lecture:10 Python Interactive Mode

Lecture:11 Python In linux

Lecture:12 Linux Script mode

Lecture:13 Linux GUI mode

Lecture:14 How to Install IDLE in Linux

Lecture:15 How to set Path

Chapter III – Basics Of Python

Lecture:16 Python “Hello World”

Lecture:17 How to Execute Python

Lecture:18 Variables in python

Lecture:19 Keywords in python

Lecture:20 Identifiers in python

Lecture:21 Literals in python

Lecture:22 Operators in python

  • Lecture:23 Comments in python
Chapter IV – Python Strings

Lecture:24 Accessing Strings

Lecture:25 Strings Operators

Lecture:26 Basic Operators.

Lecture:27 Membership Operators.

Lecture:28 Relational Operators.

Lecture:29 Slice Notation

Lecture:30 String Functions and Methods

Chapter V – Python Lists

Lecture:31 How to define list

Lecture:32 Accessing list

Lecture:33 Elements in a Lists

Lecture:34 List Operations

Lecture:35 Adding Lists

Lecture:36 Replicating lists

Lecture:37 List slicing

Lecture:38 Updating elements in a List

Lecture:39 Appending elements to a List

Lecture:40 Deleting Elements from a List

Lecture:41 Functions and Methods of Lists

Chapter VI – Python Tuples

Lecture:42 How to define tuple

Lecture:43 Accessing tuple

Lecture:44 Elements in a tuple

Lecture:45 tuple Operations

Lecture:46 tuple slicing

Lecture:47 Deleting tuple

Lecture:48 Functions and Methods of tuple

Chapter VII – Python Dictionary

Lecture:49 How to define dictionary

Lecture:50 Accessing Dictionary

Lecture:51 Updation

Lecture:52 Deletion

Lecture:53 Functions and Methods

Chapter VIII – Python Control Statement 

Lecture:54 “If” in python

Lecture:55 “If else” in python

Lecture:56 “else if” in python

Lecture:57 “nested if” in python

Lecture:58 “for loop” in python

Lecture:59 “while loop” in python

Lecture:60 “break” in python

Lecture:61 “continue” in python

Lecture:62 “pass” in python

Chapter IX – Python Functions 

Lecture:63 Defining a Function

Lecture:64 Invoking a Function

Lecture:65 return Statement

Lecture:66 Argument and Parameter

Lecture:67 Passing Parameters

Lecture:68 Default Arguments

Lecture:69 Keyword Arguments

Lecture:70 Anonymous Function

Lecture:71 Difference between Normal Functions and Anonymous Function

Lecture:72 Scope of Variable

Chapter X – Python Files I/O

Lecture:73 “print” statement

Lecture:74 Input from Keyboard

Chapter XI – File Handling 

Lecture:75 Operations on Files

Lecture:76 Opening file

Lecture:77 closing file

Lecture:78 reading file

Lecture:79 writing file

Lecture:80 Modes of files

Lecture:81 Methods in files

Chapter XII – Python OOPs Concept 

Lecture:82 Python OOPs Concepts

Lecture:83 Python Object Class

Lecture:84 Python Constructors

Lecture:85 Python Inheritance

Lecture:86 Multilevel Inheritance

Lecture:87 Multiple Inheritance

Chapter XII – Python Modules

Lecture:88 Importing a Module

Lecture:89 Example of importing multiple modules

Lecture:90 How to use “from” import statement

Lecture:91 import whole module

Lecture:92 Built in Modules in Python

Lecture:93 Package

Chapter XIV – Python Exceptions

Lecture:94 What is Exception handling

Lecture:95 Declaring Multiple Exception

Lecture:96 Finally Block

Lecture:97 Raise an Exception

Lecture:98 Custom Exception

Chapter XV – Python Date

Lecture:99 Retrieve Time

Lecture:100 Formatted Time

Lecture:101 time module

Lecture:102 Calendar

Lecture:103 Calendar module

Chapter XVI – Python Network Programming

Lecture:118 Basics of networking

Lecture:119 What is socket?

Lecture:120 How to make socket?

Lecture:121 socket methods

Lecture:122 creating server

Lecture:123 creating client

Lecture:124 creating echo server

Lecture:125 Python Internet modules

Lecture:126 Port scanner in python

Lecture:127 Creating Webserver

Advanced Python Module:

  • Chapter I –  Quick Review
  • Chapter II – Threading and Parameter Parsing
  • Chapter III – Socket Programming
  • Chapter IV – Network Packets and Web
  • Chapter V – Creating Hacking and Forensic Tools
  • Chapter VI – Shell Programming In Python
  • Chapter VII – Web Hacking With Python
Chapter I –  Quick Review

Lecture 1: Data TypesLecture

2: Exception in PythonLecture

3: Function in PythonLecture

4: Class in PythonLecture

5: Modules in python

Chapter II – Threading and Parameter Parsing

Lecture 1: Threading

Lecture 2: Argparse

Lecture 3: Build Windows application

Chapter III – Socket Programming

Lecture 1: Socket BasicLecture

2: Socket Client

Lecture 3: Socket Server

Lecture 4: Networking Concepts & Applications

Chapter IV – Network Packets and Web

Lecture 1:  Creating Http Server

Lecture 2: Fetching Web pages

Lecture 3: Packet Sniffing

Chapter V – Creating Hacking and Forensic Tools

Lecture 1:  Port Scanner

Lecture 2: Keyboard Sniffer

Lecture 3: Ethernet Sniffer

Lecture 4: Wifi History Logger

Chapter VI – Shell Programming In Python

Lecture 1: Reverse Shell in TCP

Lecture 2: Reverse Shell in HTTP

Lecture 3: Persistence Shell

Chapter VII – Web Hacking With Python

Lecture 1:  Making Phishing Framework

Lecture 2: Bypassing  2-Factor Authentication using Python

Machine Learning using Python Training Module

  • Chapter I 
  • Chapter II
  • Chapter III
  • Chapter IV 
  • Chapter V
  • Chapter VI
  • Chapter VII
  • Chapter VIII 
  • Chapter IX
  • Chapter X
  • Chapter XI
Chapter I 

Features of Python

Using the Python Interpreter 

Invoking the Interpreter

The Interpreter and Its Environment

Introduction to Anaconda

Anaconda Navigator

Anaconda Prompt

IPython Console

Jupyter qtconsole

Jupyter Notebook

Spyder

An Informal Introduction to Python

Using Python as a Calculator

First Steps Towards Programming

Control Flow Tools

if Statements

for Statements

The range() Function

break and continue Statements, and else Clauses on Loops

pass Statements

Defining Functions

More on Defining Function

Function special attributes

Coding Style

Chapter II

Data Structures

Lists

The del statement

Tuples and Sequences

Sets

Dictionaries

Looping Techniques

More on Conditions

Comparing Sequences and Other Types

Chapter III

Object: properties and operations

Class as a blueprint for objects

Fields: Python convention for defining private fields

Constructors: overloading and chaining

Designing static properties, operations and blocks in Python

Special method names in a class and their uses (e.g. __new__, __del__, __str__ etc)

Chapter IV 

Lecture 1:  Creating Http Server

Lecture 2: Fetching Web pages

Lecture 3: Packet Sniffing

Chapter V

Single and multiple inheritance

Method overriding and polymorphism

Iterators

Generators

Generator and Exceptions

Syntax Errors

Exceptions

Handling Exceptions

Raising Exceptions

User-defined Exceptions

Defining Clean-up Actions

Predefined Clean-up Actions

Chapter VI

Scipy and Numpy

The Basics

An example

Array Creation

Printing Arrays

Basic Operations

Universal Functions

Indexing, Slicing and Iterating

Shape Manipulation

Changing the shape of an array

Stacking together different arrays

Splitting one array into several smaller ones

Copies and Views

No Copy at All

View or Shallow Copy

Deep Copy

Functions and Methods Overview

Broadcasting rules

Fancy indexing and index tricks

Indexing with Arrays of Indices

Indexing with Boolean Arrays

The ix_() function

Indexing with strings

Linear Algebra

Simple Array Operations

Tricks and Tips

“Automatic” Reshaping

Vector Stacking

Histograms

Chapter VII

Basics of Pandas

Introduction to Pandas Data Structures

Series

DataFrame

Index Objects

Essential Functionality

Reindexing

Dropping entries from an axis

Indexing, selection and filtering

Arithmetic and data alignment

Function application and mapping

Sorting and ranking

Axis indexes and duplicate values

Summarizing and Computing descriptive statistics

Correlation and Covariance

Unique values, Value Counts and  Membership

Handling missing data

Filtering out missing Data

Filling out missing Data

Hierarchical Indexing

Reordering and sorting levels

Summary statistics by level

Using a dataframe’s column

Other Pandas topics

Integer indexing

Panel Data

Chapter VIII 

Machine learning vs Statistical Modelling & Supervised vs Unsupervised Learning

Machine Learning Languages, Types, and Examples

Machine Learning vs Statistical Modelling

Supervised vs Unsupervised Learning 

Supervised Learning Classification

Unsupervised Learning

Chapter IX

Supervised Learning I

K-Nearest Neighbours

Decision Trees

Random Forests

Reliability of Random Forests 

Advantages & Disadvantages of Decision Trees 

Chapter X

Supervised Learning II

Regression Algorithms

Model Evaluation

Model Evaluation: Overfitting & Underfitting

Understanding Different Evaluation Models 

Chapter XI

Unsupervised Learning

K-Means Clustering plus Advantages & Disadvantages 

IoT Training Module

  • Chapter I –  Quick Review
Chapter I –  Quick Review

Introduction to IoT

Role of IoT in Data Analytics

Application of IoT & Data Analytics

SMART CITY

Hospital

Real Estate

Security System (Bank, Manufacturing)

Defense and Aviation

Disaster Management – Mining, etc.

Architecture of both the Raspberry Pi and the Sensors.

Sensors (Temperatue, Pressure, Humidity, Motion, etc.)

Communication Protocols of IoT

Essentials of Python Programming for IOT & Data Analytics

Essential concept on Big Data Platform in the context of IoT

Programming Raspberry Pi using Python

Connecting sensors over IoT

Loading/ Storing IoT generated data into remote Big Data Platform

Transmitting, receiving and retrieving data from IoT to different IT platforms (Local Spreadsheet, RDBMS, Big Data, Cloud, etc.)

Building/ Resolving End-to-End application that involves IoT & Data Analytics

Android Training Module:

  • Chapter I –  Introduction To Android Development
  • Chapter II – Android UI Layout
  • Chapter III – Android UI Control
  • Chapter IV – Android Activity and Intents and Service
  • Chapter V – Fragment
  • Chapter VI – Database
  • Chapter VII – List View and recycle View
  • Chapter VIII – Multimedia Audio and Video and Camera
  • Chapter IX – Content Providers
  • Chapter X – Location and Google Map
  • Chapter XI – REST API Integration (JSON)
  • Chapter XII – Generate APK File
  • Chapter XIII – Build.gradle
  • Chapter XIV – Project Task
Chapter I –  Introduction To Android Development

Android Introduction

Android Architecture

Android Installation

Launching Android Studio / Eclipse

Android Project Structure

Android Manifest XML

Activity LifeCycle

Toast

Broadcast Receiver

Chapter II – Android UI Layout

How to Create Layout

Chapter III – Android UI Control

Text View

Edit Text

Button

Checkbox

Toggle Button

Radio button

Radio Group

Progress Bar

Spinner

Time Picker

Date Picker

Chapter IV – Android Activity and Intents and Service

Activity Lifecycles

Intents

Services and Life cycle ( Basic )

Chapter V – Fragment

Fragment Lifecycles

How to use fragment ( Basic )

Chapter VI – Database

SQL Lite Database ( Basic )

Insert. Update, Delete task using database ( Basic )

Chapter VII – List View and recycle View

Populate listview

Populate Recylerview

Chapter VIII – Multimedia Audio and Video and Camera

Media Playback

Camera

Video playback

Chapter IX – Content Providers

Contact Provider ( Basic )

Chapter X – Location and Google Map

Getting a Current Location ( Basic )

Using Maps with Location ( Basic )

Google API key ( Basic )

Chapter XI – REST API Integration (JSON)

JSON Parse ( Basic )

Asynctask  ( Basic )

Chapter XII – Generate APK File

Build APK file  ( Not signed )

Chapter XIII – Build.gradle

What is build.gradle ( Basic )

Compile other libraries ( Basic )

Chapter XIV – Project Task

Create Android Application on specific topic

Android Penetration Testing Training Module:

  • Chapter I –  Introduction To Android Security
  • Chapter II – Creating A Suitable Penetration Testing Environment
  • Chapter III – Application Dynamic Runtime Analysis
  • Chapter IV – Traffic Analysis and Manipulation
  • Chapter V – Pentesting Server-side Communication
  • Chapter VI – Android Malware
  • Chapter VII – Penetration Testing With Android
  • Chapter VIII – Maintaining Anonymity On An Android Device  
  • Chapter IX – Network Pentesting Using Android Devices
  • Chapter X – Network Pentesting Using Android Devices
  • Chapter XI – Web Application Attack Techniques On Android
  • Chapter XII – Web Application Attack Techniques On Android
Chapter I –  Introduction To Android Security

Android is a Linux kernel mobile platform. Android runs on a wide range of devices, from mobile smartphones and tablets, to set-top boxes. The Android mobile operating system is dependent upon the mobile device’s processer capabilities for its performance.

Chapter II – Creating A Suitable Penetration Testing Environment

Introduction To Custom ROMs And Kernels

Introduction to Bootloaders and Recoveries

CWM and TWRP

Flashing custom Recoveries

Flashing custom ROMs and Kernels

Introduction to CyanogenMod, AOSP, AOKP and other Android projects

Chapter III – Application Dynamic Runtime Analysis

Monitoring process activity

Observing file access

Monitoring network connectivity

Analyzing logs

Run time instrumentation and manipulation

Memory modification for running applications

Chapter IV – Traffic Analysis and Manipulation

Common Vulnerabilities Related to Traffic

Proxies and sniffers

Sensitive information transmission

Importing SSL certificates & trusted CA’s

Bypassing server certificate validations

Exposing insecure traffic

Validating server certificates and avoiding man-in-the-middle

Client side certificate authentication

Chapter V – Pentesting Server-side Communication

Common app-to-server vulnerabilities

Proxies vs Transparent Proxies

Installing Trusted CA on an Android device

Performing fuzzing on the Application Server

Testing for conventional vulnerabilities server-side (Eg. SQLi, XSS, CSRF, Cookie Hijacking etc)

Chapter VI – Android Malware

Students will be provided an Android malware sample to test and decompile and analyze

Android malware apk testing to decrypt communication

Providing Source-code of a second Android malware for manual modification and compiling

Identifying connection strings and API calls

Chapter VII – Penetration Testing With Android

Setting up various tools and security suites to facilitate penetration testing with an Android device

Packet sniffing and DOS attacks on Android

ARP Spoofing on Android devices

Chapter VIII – Maintaining Anonymity On An Android Device  

Setting up various tools and security suites to facilitate penetration testing with an Android device

Packet sniffing and DOS attacks on Android

ARP Spoofing on Android devices

Chapter IX – Network Pentesting Using Android Devices

Setting up various tools and security suites to facilitate penetration testing with an Android device

Packet sniffing and DOS attacks on Android

ARP Spoofing on Android devices

Chapter X – Network Pentesting Using Android Devices

Setting up various tools and security suites to facilitate penetration testing with an Android device

Packet sniffing and DOS attacks on Android

ARP Spoofing on Android devices

Chapter XI – Web Application Attack Techniques On Android

Setting up various tools and security suites to facilitate penetration testing with an Android device

Packet sniffing and DOS attacks on Android

ARP Spoofing on Android devices

Chapter XII – Web Application Attack Techniques On Android

Setting up various tools and security suites to facilitate penetration testing with an Android device

Packet sniffing and DOS attacks on Android

ARP Spoofing on Android devices

Certified Ethical Hacker Training (CEHv10) Module:

  • Chapter I – Introduction To Ethical Hacking
  • Chapter II – Steps Of Ethical Hacking Information Gathering
  • Chapter III – Types Of Malicious Files 
  • Chapter IV – Penetration Testing
  • Chapter V – Google Hacking Using Dork Demo
  • Chapter VI – System Hacking
  • Chapter VII – Scanning With Nessus Hacking With Metasploit
  • Chapter VIII – What Is SE Toolkit 
  • Chapter IX – What Is Remote Administration Tool
  • Chapter X – What Is Sniffing
  • Chapter XI – What Is DOS 
  • Chapter XII – Wireless Network Hacking 
  • Chapter XII – Web Application Pen Testing
  • Chapter XIV – OWASP Top 10
  • Chapter XV – What Is XSS
  • Chapter XVI – What Is CSRF
  • Chapter XVI – What Is Dictionary Listing
  • Chapter XVI – What Is Phishing
  • Chapter XVI – Hacking Android Phone Using Metasploit Question and Answer
  • Chapter XVI – Project
Chapter I – Introduction To Ethical Hacking

What is Hacking

What is Ethical Hacking

Types of Hackers

White Hat Hacker

Black Hat Hackers

Gray Hat Hackers

Script Kiddies

Hacktivists

Spy Hackers

Cyber Terrorists

VulnerabilityExploit

Remote Exploit

Local Exploit

Zero-day0-day vulnerability

Zero-day Exploit

Brute force attack

Phishing

Remote access

Payload

100 Marks Internal Exam ( Practical or article submission )

Chapter II – Steps Of Ethical Hacking Information Gathering

Active Information Gathering

Passive Information Gathering

Scanning

Gaining Access

Maintaining Access

Covering Tracks

100 Marks Internal Exam ( Practical or article submission )

Chapter III – Types Of Malicious Files 

Viruses

Worms

Trojan Horse

Spyware

Adware

Backdoor

Rootkits

Ransomware

100 Marks Internal Exam ( Practical or article submission )

Chapter IV – Penetration Testing

What is Penetration Testing

Types of Penetration Testing

What is white box Penetration Testing

What is Black Box Penetration testing

Introduction to Linux OS

Social Engineering

100 Marks Internal Exam ( Practical or article submission )

Chapter V – Google Hacking Using Dork Demo

What is Virtual Machine

What’s VMware

What is Virtual Box

Installing VMware

Install Kali Linux

Installing Windows XP

Install Windows 7

Install Add on in Mozila

Tamper Data

Burp Suite

No-Redirect

Install Nessus

Chapter VI – System Hacking

System Hacking using Kon-Boot

Network Scanning

Port Scanning

Service Scanning

What is Nmap

Scanning With Nmap

Nmap Various Command

Chapter VII – Scanning With Nessus Hacking With Metasploit

What is Metasploit?

Xp Remote Exploit using Metasploit

Msfvenom

Windows7 UAC Bypass

Chapter VIII – What Is SE Toolkit 

SE-Toolkit Usages

Create Phishing page with SE-Toolkit

Hacking Facebook & Gmail password

Chapter IX – What Is Remote Administration Tool

What is RAT

Exploit With RAT

Protect System from RAT

Chapter X – What Is Sniffing

Types of Sniffing

Network Sniffing with Wireshark

Get FTP Login Details Using Wireshark

Chapter XI – What Is DOS 

Details of DOS

What is DDOS

Chapter XII – Wireless Network Hacking 

Wireless Encryption

Hacking WPA 2

Chapter XII – Web Application Pen Testing

How Web Application Works

Request and Response

Installing Scanner (Acunetix,Netsparker)

Scanning Website

Chapter XIV – OWASP Top 10

What is Sql-Injection?

Types of Sql-Injection

Live Demo on Sql-Injection

Chapter XV – What Is XSS

Types of XSS

Live Demo on XSS All types

Chapter XVI – What Is CSRF

Live Demo On CSRF

What is HTML Injection

Live Demo on HTML Injection

Chapter XVI – What Is Dictionary Listing

Live Demo on Directory Listing

What is Broken Auth

Demonstration on Broken Auth

What is Tamper data?

Live Demo on Tamper Data on Ecommerce site

Session Hijacking

Chapter XVI – What Is Phishing

Create a Phishing Page

What is Web Shell

Hack Web-Server Using Web-Shell

Chapter XVI – Hacking Android Phone Using Metasploit Question and Answer

Create a Phishing Page

What is Web Shell

Hack Web-Server Using Web-Shell

Chapter XVI – Project

Create a Phishing Page

What is Web Shell

Hack Web-Server Using Web-Shell

C|EHP – Course Module

  • Introduction to Ethical Hacking
  • Steps of Ethical Hacking & Information Gathering 
  • Types of Malicious Files
  • Penetration Testing
  • Google Hacking using Dorks
  • Penetration Testing Lab – Setup & Installation 
  • System Hacking
  • Scanning with Nessus & Hacking with Metasploit 
  • SE-Toolkit 
  • Sniffing 
  • Remote Administration Tool – RAT 
  • Remote Administration Tool – RAT 
  • Remote Administration Tool – RAT 
Introduction to Ethical Hacking
  • What is Hacking
  • What is Ethical Hacking
  • Types of Hackers
  • White Hat Hacker
  • Black Hat Hackers
  • Gray Hat Hackers
  • Script Kiddies
  • Hacktivists
  • Spy Hackers
  • Cyber Terrorists
  • Vulnerability
  • Exploit
  • Remote Exploit
  • Local Exploit
  • Zero-day
  • Zero-day vulnerability
  • Zero-day Exploit
  • Brute force attack
  • Phishing
  • Remote access
  • Payload

Steps of Ethical Hacking & Information Gathering 
  • Active Information Gathering
  • Passive Information Gathering
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks
Types of Malicious Files
  • Viruses
  • Worms
  • Trojan Horse
  • Spyware
  • Adware
  • Backdoor
  • Rootkits
  • Ransomware
Penetration Testing
  • What is Penetration Testing
  • Types of Penetration Testing
  • What is white box Penetration Testing
  • What is Black Box Penetration testing
  • Introduction to Linux OS
  • Social Engineering
Google Hacking using Dorks
  • Google Hacking Database
  • Social Engineering the art of Human Hacking
  • Gaining Target information using Google Dorks
Penetration Testing Lab – Setup & Installation 
  • What is Virtual Machine
  • What is VMware
  • What is Virtual Box
  • Install VMware
  • Install Kali Linux
  • Install Windows XP
  • Install Windows 7
  • Install Windows 10
  • Install Add on in Mozilla
  • Tamper Data
  • Burp Suite
  • No-Redirect
  • Install Nessus
System Hacking
  • System Hacking using Kon-Boot
  • Network Scanning
  • Port Scanning
  • Service Scanning
  • What is Nmap
  • Scanning With Nmap
  • Nmap Commands
Scanning with Nessus & Hacking with Metasploit 
  • What is Metasploit?
  • Xp Remote Exploit using Metasploit
  • Msfvenom
  • Windows 7 UAC Bypass
SE-Toolkit 
  • SE-Toolkit Usages
  • Create Phishing page with SE-Toolkit
  • Hacking Facebook & Gmail password

Sniffing 
Remote Administration Tool – RAT 
  • What is RAT ?
  • Exploit With RAT
  • Protect System from RAT
Remote Administration Tool – RAT 
  • What is RAT ?
  • Exploit With RAT
  • Protect System from RAT
Remote Administration Tool – RAT 
  • What is RAT ?
  • Exploit With RAT
  • Protect System from RAT

Web Application Penetration Testing Training Module:

  • Chapter I –  HTTP Basics
  • Chapter II – OWASP (Open Web Application Security Project)
  • Chapter III – SQL Injection
  • Chapter IV – Cross Site Request Frogery (CSRF)
  • Chapter V – Cross Site Scripting (XSS)
  • Chapter VI – Command Injection
  • Chapter VII – Directory Traversal
  • Chapter VIII – Input Validation  
  • Chapter IX – Information Leakage
  • Chapter X – Click Jacking
  • Chapter XI – Web Application Security Control
  • Chapter XII – Exploitation and Information Gathering Tools
Chapter I –  HTTP Basics

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web.

Chapter II – OWASP (Open Web Application Security Project)

The Open Web Application Security Project is an online community which creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.

Chapter III – SQL Injection

SQL injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server (also commonly referred to as a Relational Database Management System – RDBMS). Since an SQL injection vulnerability could possibly affect any website or web application that makes use of an SQL-based database, the vulnerability is one of the oldest, most prevalent and most dangerous of web application vulnerabilities.

Chapter IV – Cross Site Request Frogery (CSRF)

Cross-Site Request Forgery (CSRF) is an attack outlined in the OWASP Top 10 whereby a malicious website will send a request to a web application that a user is already authenticated against from a different website. This way an attacker can access functionality in a target web application via the victim’s already authenticated browser. Targets include web applications like social media, in-browser email clients, online banking and web interfaces for network devices.

Chapter V – Cross Site Scripting (XSS)

Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts (also commonly referred to as a malicious payload) into a legitimate website or web application. XSS is amongst the most rampant of web application vulnerabilities and occurs when a web application makes use of unvalidated or unencoded user input within the output it generates.

Chapter VI – Command Injection

Command injections are prevalent to any application independently of its operating system that hosts the application or the programming language that the application itself is developed. The impact of command injection attacks ranges from loss of data confidentiality and integrity to unauthorized remote access to the system that hosts the vulnerable application.

Chapter VII – Directory Traversal

The web server is configured to display the list of files contained in this directory. This is not recommended because the directory may contain files that are not normally exposed through links on the web site.

Chapter VIII – Input Validation  

Input Validation is the outer defensive perimeter for your web application. This perimeter protects the core business logic, processing and output generation. Beyond the perimeter is everything considered potential enemy territory which is…literally everything other than the literal code executed by the current request.

Chapter IX – Information Leakage

Information Leakage is an application weakness where an application reveals sensitive data, such as technical details of the web application, environment, or user-specific data. Sensitive data may be used by an attacker to exploit the target web application, its hosting network, or its users.

Chapter X – Click Jacking

Clickjacking attacks are an emerging threat on the web. In this paper, we design new clickjacking attack variants using existing techniques and demonstrate that existing clickjacking defenses are insufficient. Our attacks show that clickjacking can cause severe damages, including compromising a user’s private webcam, email or other private data, and web surfing anonymity.

Chapter XI – Web Application Security Control

Application Security – Overview

Treat Modeling

Hacker’s Approach

Practical Considerations

Case Study

Chapter XII – Exploitation and Information Gathering Tools

Burp Suite 

Sqlmap

Acunetix

Archini

W3af

Browser Exploitation Framework (BeEF)

×

Hello!

Click one of our representatives below to chat on WhatsApp or send us an email to [email protected]

× Hi How can we help you