Pune
    Posted: 12 days ago by
    Shortlist

    Best Cyber Security Training in Pune

    Course
    Teaching
    You are
    Offering Professional Course
    Locality
    Karve Road
     
    Reply
     

    Description for "Best Cyber Security Training in Pune"

    Syllabus Cyber Security
    1.0 Introduction It Security
    Information Security
    Security and Its Needs
    It Security Life Cycle
    2.0 Desktop Security
    Operating System Basics
    Windows Installation
    Windows Policies
    What Is Vmware
    Basic of Computer Networking
    OSI and TCP/IP Model
    Tcp Vs Udp
    Tcp Frame Header
    Udp Frame Header
    Tcp Communication Flags
    Networking Devices (Hub,Router,Switch,Etc.)
    Windows and Linux Dual Boot
    3.0 Networking Security
    Mac address, IP-address Classes
    What is Router
    Static and Dynamic Routing
    Sending the Messages
    Routing the Traffic
    Transmitting the Packets
    Configuration of Router
    Protocols on Router
    Nat (Network Address Translation)
    Pat (Port Address Translation)
    What Is Dsl and Adsl Router
    ACL
    Troubleshooting
    Securing the Routers
    4.0 Linux Security
    Introduction
    Benefits of Linux
    Kali Linux and Red Hat
    Linux Directory and File System Structure
    File Permission on Linux
    Linux Commands (Find,grep,etc)
    How to Set Up a Firewall Under Linux?
    Iptables and Configuration
    Windows Vs. Linux Design
    5.0 Introduction to Hacking
    Introduction to Ethical Hacking
    Windows and Linux Intro
    Kali Linux (Usages)
    Deep/Dark Web
    6.0 Reconnaissance
    Information Intelligence.
    Organize Your Information
    Google/bing Hacking.
    Whois Lookup.
    Os Info Hunting.
    Uptime Info Hunting.
    7.0 Scanning
    Web Server Info Hunting
    Traceroute Target Ip Address.
    Tcp Port Scanning.
    Syn Port Scanning.
    Tcp Ack Firewall Scanning.
    Finding Live Hosts
    Udp Sweeping and Probing
    8.0 Enumeration
    Enumerating Username Groups and Passwords.
    Hunting and Profiling People.
    Gathering Email Accounts Sub Domains/host.
    Database Enumeration.
    Dns Enumeration.
    9.0 Hacking Web Server
    Attacking Apache Web Server.
    Attacking IIS Web Server.
    10.0 System Hacking
    Linux Hacking and Securing
    Windows Hacking and Securing
    11.0 Wireless Hacking
    Attacking Wep Protected 802.11 Networks.
    Attacking Wpa/wpa2 Protected 802.11 Networks.
    Rogue Access Point
    Man in Middle Attack (Mitm)
    Evil Twin Attack
    Bluetooth Hacking
    12.0 Dos and Ddos
    Dos and DDos
    Dos and Ddos Tools and Commands
    DDos Attack on Bank-Website
    Dos Attack on Server (Self)
    13.0 Cryptography
    What Is Cryptography
    What Is Cipher?
    Ciphers Types
    Types of Cryptography
    Hashing
    Hashing File and Passwords
    Pkc
    14.0 Steganography
    What Is Steganography
    LSB Algorithm
    Steganography in Images
    Steganography in Audio
    Whitespace Steganography
    15.0 PassWords Attacks
    Cryptography Attacks
    Password Attacks
    Types of Password Attacks
    Password Cracking of Windows, Linux, Ssh.
    Website Password Cracking
    16.0 Social Engineering
    Phishing
    Advanced Social Engineering Attacks
    Spear Phishing Attacks.
    Sms Spoofing
    Email Spoofing
    Hacking Email Accounts
    Countermeasures
    17.0 Sniffing and Spoofing
    What Is a Cam Table
    Sniffing Network Passwords
    Sniffing Http Passwords
    Sniffing Ftp and Telnet Passwords
    .
    Active Sniffing
    Passive Sniffing
    Sniffing Cookies
    Man in the Middle Attack.
    18.0 Systems Hacking and Exploit-development
    Windows and Linux Hacking
    Advanced Antivirus Detection Evasion and Bypassing.
    Advanced Firewall Outbound/inbound Rules Evasion and Bypassing.
    Advanced Windows User Access Control (Uac) Evasion and Bypassing.
    Assembly Language
    Exploit Writing
    Windows Buffer Overflow Exploit
    Linux Buffer Overflow Exploit
    19.0 Firewall,IDS,IPS and Honeypot
    What Is Ids
    Ids Types
    What Is Ips
    Firewall
    Firewall Types
    Hardware and Software Firewall
    Securing Network With (Smoothsec Express) Next-Gen Firewall.
    Honeypot and Honeynet
    Honeypot Low and High Interaction
    Tracing Black-Hat Hacker
    Evading Ids, Firewall,honeypot
    20.0 VPN and Proxy-server
    What Is Proxy
    Proxy Types
    Socks and Reverse-proxy
    Vpn
    Vpn Types
    Open Vpn
    Ipsec Vpn
    Vpn Types
    Vpn Security Issues
    21.0 Malwares
    Writing Trojan for Windows.
    What Is a Botnet and Attacks.
    Mobile Malware
    Mobile Anti-malware
    Virus and Worms
    Ransomware for Linux and Windows
    Anti-malware
    Malware Analysis
    Sheep-dip System
    Malwares Countermeasures
    22.0 Cloud Computing
    What Is Cloud.
    What Is Types and Use.
    Cloud for Hackers
    23.0 Android Introduction
    Introduction to the Course
    Course Instructions
    What Is Android.
    24.0 Interacting With Android Devices
    Rooting
    Termux for Android
    Vnc-remote Access
    Busybox Tools.
    25.0 Android Hacking and Exploitation.
    Exploiting Android Devices Using Metasploit
    Hacking Windows,android Using Android Phone.
    Bypassing Android Locks
    Data Hacking of Android
    26.0 Android Pentesting
    Removing-ads From Android
    Cracking Application for Free Use.
    Hiding Identity From Police.
    Hacking Calls Logs and Sms Messages From Android Devices.
    27.0 Introduction to WAPT
    What Is Web Penetration Testing
    What Is Web?
    Understanding the Depth of Web
    28.0 Owasp Top 10 Injection
    What Is Owasp Top 10 Injection
    What Is Proxy?
    What Is Interception Proxies
    Burp Suite Introduction
    29.0 Information Gathering WAPT
    Finding Whois and Dns
    Dns Harvesting Extracting
    A Open Source Information Gathering
    The Http Protocols
    Http Methods
    Http Status Codes
    Http Request and Response
    What Is HTTPS
    Http Methods and Verb Tampering
    Http Method Testing With Nmap and Metasploit
    .
    30.0 Web App Basic Test
    Web App Cryptography Attacks
    Data Encoding
    Encoding Schemes, URL Encoding, Unicode Encoding
    Bypassing Weak Cipher
    Testing Https
    Nmap Scan
    Gathering Server Info
    31.0 Burp Suite in-depth
    Burp Target
    Burp Proxy
    Burp Intruder
    Burp Repeater
    Burp Scripting
    Spidering Web Application
    Analysing Spidering
    Burp Fuzzing
    32.0 Broken Authentication and Session Management
    Information Leakage
    Directory Browsing
    What Is Authentication
    Http Response Splitting
    Http Basic Authentication
    Bypass Authentication Prompt
    Attacking Http Basic Authentication With Nmap and Metasploit
    Http Digest Authentication
    Http Set-cookie With Httpcookie
    Username Harvest
    33.0 Injection Attacks
    Html Injection Basics
    Html Injection in Tag Parameters
    Session Tracking
    Session Fixation
    Authentication Bypass
    34.0 Command Injection
    Command Injection
    Web to Shell on the Server
    Web Shell: Php Meterpreter
    Web Shell: Netcat Reverse Connects
    Web Shell: Using Python, Php Etc.
    35.0 LFI and RFI
    Remote Basics
    RFI to Meterpreter
    LFI Basics
    LFI With Directory Prepends
    Remote Code Execution With LFI and File Upload Vulnerability
    36.0 Upload Attacks
    File Upload Vulnerability Basics
    Beating Content-type Check in File Upload
    Bypassing Blacklists in File Upload
    Bypassing Whitelists Using Double Extensions in File Uploads
    Null Byte Injection in File Uploads
    Exploiting File Uploads to Get Meterpreter
    37.0 Unvalidated Redirects and Forwards
    Unvalidated Redirects
    Exploitation Open Redirects
    Securing Open Redirects
    38.0 Sql Injection
    Sql Injection
    Sqli Discovering
    Error Based Sqli
    Blind Based Sqli
    Data Extraction
    Sql Tools
    Sqlmap
    Sqlmap + Zap
    39.0 Client-side Attacks
    What Is Javascript
    Dom-based XSS
    Explotating Dom-XSS
    Javascript Injection
    Cross-site Scripting
    Reflective XSS
    Stored XSS
    XSS Tools
    XSS Fuzzing
    XSS Exploitation
    Beef Tool Stealing Cookies
    Ajax
    Ajax XSS
    40.0 Csrf Attacks
    Cross-site Request Forgery
    Exploitation CSRF
    Login Attack
    41.0 Web App Tools
    What Is Automation Testing
    What Is Manual Testing
    Wpscan
    W3af
    Wordpress Testing
    42.0 Firewall Testing
    Web Application Firewall
    Wap Options
    Mod_security
    Waf Detection
    43.0 Methodology and Reporting
    Web Application Penetration Testing Methods
    Reporting and Presenting
    44.0 Other Attacks
    SSI Attacks
    Server-side Template Injection
    IDOR Injection
    LDAP Injection
    Xml External Entity
    45.0 Platform
    Cross-site Request Forgery
    Exploitation CSRF
    Login Attack
    46.0 Penetration testing with Bash script
    Chapter 1: Getting to Know Bash
    Navigating and searching the filesystem
    Using I/O redirection
    Using pipes
    Getting to know grep
    Chapter 2: Customizing your shell
    Formatting the terminal Output
    The Prompt String
    Aliases
    Customizing the command history
    Customizing tab completion
    Chapter 3: Network Reconnaissance
    Interrogation the Whois servers
    Interrogating the DNS servers
    Enumerating target on the local network
    Chapter 4: Exploitation and Reverse Engineering
    Using the Metasploit command-line interface
    Preparing payloads with Metsploit
    Creating and deploying a payload
    Diassembling binaries
    Debugging binaries for dynamic analysis
    Chapter 5: Network Exploitation and Monitoring
    MAC and ARP abuse
    Man in the middle attacks
    Interrogating servers
    Brute forcing authentication
    Traffic filtering with TCPDump
    Assessing SSL Implementation security
    Automated web application security assessment
    47.0 Penetration testing with Python
    Chapter 1: Python with Penetration Testing and Networking
    Introducing the scope of pentesting
    Approaches to pentesting
    Introducing Python scripting
    Understanding the tests and tools you'll need
    Learning the common testing platforms with Python
    Network sockets
    Server socket methods
    Client Socket methods
    General socket methods
    Moving on the practical
    Chapter 2: Scanning Pentesting
    How to check live system in a network and concept of a live system
    What are the services running on the target machine?
    Chapter 3: Sniffing and Penetration Testing
    Introducing a network sniffer
    Implementing a network sniffer using python
    Learning about packing crafing
    Introducing ARP spoofing and implementing it using Python
    Tesing and Security system using custom packet crafting and injection
    Chapter 4: Wireless Pentesting
    Wireless SSID finding and wireless traffic analysis by python
    Wireless attacks
    Chapter 5: Foot Printing of a Web Server and a Web Application
    The concept of foot printing of a web server
    Information gathering of a website from smartwhois by the parser
    BeautifulSoup
    Banner Grabbing of a website
    Hardening of a web server
    Chapter 6: Client-Side and DDoS Attacks
    Introducing client-side validation
    Tampering with the client-side parameter with Python
    Effects of parameter tempering on business
    Introducing DoS and DDoS
    Chaptr 7: Pentesting of SQLI and XSS
    Introducing the SQL injection attack
    Types of SQL injections
    Understanding the SQL injection by a Python Script
    Learning about Cross-site scripting
    49.0 Computer Forensics Investigation Process
    Forensic Workstation Building Sift
    Chain of Custody
    Data Imaging(FTK Imager)
    Data Integrity(Sha256sum)
    Data Carving(Physical Level)
    Data Analysis(FTK Toolkit)
    Expert Witness
    48.0 Computer Forensics in Today s World
    Intro to Computer Forensics
    Need for Computer Forensics
    What Is Cyber Crime
    Forensics Investigation Process
    Cyber Crime Reports
    Deft, Caine OS.
    50.0 Hacking Laws
    PCI-DSS, DMCA, FISMA Act
    It Act 2000
    51.0 Understanding Hard Disks and File Systems
    Disk Drive Overview
    The Sleuth Kit(Tsk) and Autopsy
    52.0 Data Acquisition and Duplication
    Volatile Information From Linux and Windows
    Acquiring Data on Windows
    Acquiring Data on Linux
    Ftk Imager and Ddclfd(Bit-stream Copy)
    Netcat for Forensic
    53.0 Defeating Anti-forensics Techniques
    Cryptography, PKI, PKC, VPN
    Steganography and Steganalysis
    Password Cracking System and Application
    Cracking Bios Password
    Alternate Data Stream
    Encrypted File System
    54.0 Operating System Forensics
    Network and Process Information
    Cache , Cookie and History Analysis
    Registry Analysis
    Linux Configuration Analysis
    Windows Event Viewer
    55.0 Network Forensics
    Network Forensic
    Intrusion Detection System(IDS)
    Firewall, IPS and Reverse-proxy.
    Honeypot and Tracing.
    Traffic Capturing and Analysis
    56.0 Investigating Web Attacks
    Web Application Architecture
    Web Attacks
    Apache Web Server Logs Investigation
    Web Attack Detection
    Tracing Ip Address
    57.0 Database Forensics
    Logon Event in Windows and Linux
    Syslog Identification
    Log Capturing and Analysis
    59.0 Investigating Email Crimes
    Email System Architecture
    Email Crimes
    Email Header Analysis.
    Tracing Emails
    58.0 Malware Forensic
    Unstructured Memory Analysis
    Bulk Extractor
    Cridex Malware Identification
    Network Activity to a Process
    60.0 Forensics Report Writing
    Forensics Report
    Report Writing and Documentation.
    Sample Report Writing
    Writing Reports Using FTL
    Writing Reports Using Autopsy
    61.0 Case Studies
    Mumbai Case
    Pune Case

     

    inform this no 8603228568 FOR PLANT AC HVAC AC TECHNICIAN CO

    WELDING COURSE ARC WELDING TRAINING IN NALANDA BIHAR We Also

    call at 8603228568 FOR WATER TREATMENT JCB POCKLAIN COURSE I

    LOADER GRADER TRAINING COURSE IN DHULE MUMBAI MAHARASHTRA J

    Digital Marketing Classes in Pune

    call this no 8789165168 FOR MECHNICAL TECHNICIAN JCB COURSE

    WATER TREATMENT SAFETY COURSE IN BHABHUA BIHAR JAMS TECHNICA

    direct call 8603455878 FOR NEBOSH OSHA IOSH DIPLOMA COURSE I

    call this no 8789165168 FOR OFFSHORE CRANE OPERATOR COURSE I