Following course has been designed for the students who are willing to concepts both in a practical and theoritcal approach. During the training students will be provided with handson lab demonistrations which will replicate realtime scenarios. Following course doesn't teach you how to run some tool to get the expected output. Instead of that, course aims to deliver core concepts and makes the student accquianted with the concept. If you are a student or professional who's looking to learn practial & handson concepts our current course would help you. If you have any additional topics which you would like to learn we will try to assist you in teaching those concepts. Team who is delivering the current training has 8 + Years of dedicated experince in the field.
Course Outline :
Module -01 : Packet Sniffing and Spoofing
Module -02 : Attacks on the TCP Protocol
Module -03 : Attacks on Firewall
Module -04 : Domain Name System (DNS) and Attacks
Module -05 : Virtual Private Network
Module -06 : Reverse Shell
Module -07 : The Heartbleed Bug and Attack
Module -08 : Software Security
Module -09 : Environment Variables and Attacks
Module -10 : Shellshock Attack
Module -11 : Buffer Overflow Attack
Module -12 : Return-to-libc Attack and ROP
Module -13 : Format String Vulnerability
Module -14 : Race Condition Vulnerability
Module -15 : Dirty COW
Module -16 : Meltdown Attack
Module -17 : Spectre Attack
Module -18 : Cryptography
Module -19 : One-Way Hash Function
Module -20 : Public Key Cryptography
Module -21 : Public Key Infrastructure
Module -22 : Transport Layer Security
Module -23 : Web Security
Module -24 : Open Source Intelligence Gathering
Module -25 : Attacking Networks
Module -26 : Attacking Active Directory
Module -27 : Client Side Attacks
Module -28 : Attacking Networks & WLAN Networks [WiFi - Hacking]
Module -29 : Customizing Attack Tool Aresenal
Module -30 : Report Writing