September 13, 2019

Python Programming

• Python Basics
• Functions and Modules
• Math (Arithmetic Operators)
• Python Strings
• Iterables: Sequences, Dictionaries, and Sets
• Flow Control
• File Processing
• Exception Handling
• Dates and Times
• Running Python Scripts from the Command Line

Read More
September 13, 2019

Mobile Penetration Tester

Topics:

• Introduction to Mobile Apps.
• Mobile Application Security.
• Mobile Application Penetration Testing.
• The most common areas where we find mobile application data resides.
• The Architecture of Android.
• The App Sandbox and the Permission Model.
• AndroidManifest.xml File.
• Android Compilation Process.
• Android Startup Process.
• Android Application Components.
• Setup a testing environment.
• Android Debug Bridge (adb).
• Digging deeper into Android (ADB tool).
• intercept and analyze the network traffic.
• Reversing an Android application.
• OWASP top 10 vulnerabilities for mobiles.
• Install DIVA (Damn insecure and vulnerable App).
• Insecure Logging Issue.
• Insecure Data Storage.
• Database Insecure Storage.
• Insecure Data Storage Inside Temporary Files.
• Hardcoding Issues.
• Input Validation Issues – SQL Injection.
• Input Validation Issues – Exploiting Web View Vulnerability.

Read More
September 13, 2019

Cyber Security analyst

• Introduction to VAPT
• Domain Name System Foot Printing
• Web Application Penetration Testing
• Metasploit Framework
• Network Vulnerability Scanning and Penetration Testing
• CMS Penetration Testing
• OWASP Top 10
• Network Sniffing
• Advance SQL Injections
• Smartphone Penetration Testing
• Buffer Overflow Attacks
• Evading IDS, IPS and WAF
• Compliance (PCI-DSS, HIPPA, ISO27001)
• Wireless Attacks
• VAPT report Generation

Read More
September 13, 2019

Ethical Hacking Expert

Topics

• Introduction to Cyber Security
• Information gathering
• Network Fundamentals
• Google Hacking
• Scanning & Enumeration
• System Hacking and Security

• Password Cracking and Security Tips
• Virus Malware and Threats
• Email Hacking and Security
• Social Engineering
• Cryptography
• DOS & DDOS Attack and Mitigation
• Introduction to OWASP
• Introduction to Kali Linux
• Web Server Hacking and Mitigation
• Wireless Hacking
• VOIP and Mobile Phone Hacking
• Cyber Law IT act 2000

Read More
September 13, 2019

Network Basics

Topic 1: Understanding Local Area Networking Topic 2: Defining Networks with the OSI Model Topic…

Read More
September 13, 2019

Python Programming

• Python Basics
• Functions and Modules
• Math (Arithmetic Operators)
• Python Strings
• Iterables: Sequences, Dictionaries, and Sets
• Flow Control
• File Processing
• Exception Handling
• Dates and Times
• Running Python Scripts from the Command Line

Read More
September 13, 2019

Mobile Penetration Tester

Topics:

• Introduction to Mobile Apps.
• Mobile Application Security.
• Mobile Application Penetration Testing.
• The most common areas where we find mobile application data resides.
• The Architecture of Android.
• The App Sandbox and the Permission Model.
• AndroidManifest.xml File.
• Android Compilation Process.
• Android Startup Process.
• Android Application Components.
• Setup a testing environment.
• Android Debug Bridge (adb).
• Digging deeper into Android (ADB tool).
• intercept and analyze the network traffic.
• Reversing an Android application.
• OWASP top 10 vulnerabilities for mobiles.
• Install DIVA (Damn insecure and vulnerable App).
• Insecure Logging Issue.
• Insecure Data Storage.
• Database Insecure Storage.
• Insecure Data Storage Inside Temporary Files.
• Hardcoding Issues.
• Input Validation Issues – SQL Injection.
• Input Validation Issues – Exploiting Web View Vulnerability.

Read More
September 13, 2019

Cyber Security analyst

• Introduction to VAPT
• Domain Name System Foot Printing
• Web Application Penetration Testing
• Metasploit Framework
• Network Vulnerability Scanning and Penetration Testing
• CMS Penetration Testing
• OWASP Top 10
• Network Sniffing
• Advance SQL Injections
• Smartphone Penetration Testing
• Buffer Overflow Attacks
• Evading IDS, IPS and WAF
• Compliance (PCI-DSS, HIPPA, ISO27001)
• Wireless Attacks
• VAPT report Generation

Read More
September 13, 2019

Ethical Hacking Expert

Topics

• Introduction to Cyber Security
• Information gathering
• Network Fundamentals
• Google Hacking
• Scanning & Enumeration
• System Hacking and Security

• Password Cracking and Security Tips
• Virus Malware and Threats
• Email Hacking and Security
• Social Engineering
• Cryptography
• DOS & DDOS Attack and Mitigation
• Introduction to OWASP
• Introduction to Kali Linux
• Web Server Hacking and Mitigation
• Wireless Hacking
• VOIP and Mobile Phone Hacking
• Cyber Law IT act 2000

Read More
September 13, 2019

Network Basics

Topic 1: Understanding Local Area Networking Topic 2: Defining Networks with the OSI Model Topic…

Read More