Our Courses
Our Courses
Pen-Testing and Ethical Hacking
Infrastructure Pentesting
- Information Gathering
- Scanning Techniques
- Network Attacks (SSH, SMTP, SMB, DNS, DHCP, etc)
- Vulnerability Assessment
- Exploitation (Windows, Linux, Routers and Switches)
- Post Exploitation (Maintain Access, Privilege Escalation)
Web Application Pentesting
- Information gathering
- OWASP top 10
- Session Security
- Authentication and Authorization
- SQL Injection
- XSS
- CRSF
- File Inclusion
- Web shell
Mobile Device Pentesting
- mobile OSs security mechanisms and implementations
- mobile applications static and dynamic analysis
- Mobile OS architecture and design
- Android: Device rooting, Tapjacking, etc
- IOS: Authorization, jailbreaking, etc.
Wireless Network Pentesting
- Bypassing WLAN Authentication – Shared Key, MAC Filtering, Hidden SSIDs
- Cracking WLAN Encryption – WEP, WPA/WPA2 Personal and Enterprise
- Attacking the WLAN Infrastructure – Rogues Devices, Evil Twins, DoS Attacks, MITM
- Advanced Enterprise Attacks – 802.1x, EAP, LEAP, PEAP, EAP-TTLS
- Attacking the Wireless Client – Honeypots and Hotspot attacks, Caffe-Latte, Hirte, Ad-Hoc Networks and Viral SSIDs, WiFishing
- Breaking into the Client – Metasploit, SET, Social Engineering
- Enterprise Wi-Fi Worms, Backdoors and Botnets
System Security
- Compiled and decompiled programs
- Winding the stack
- Foundations of reverse engineering
- Basics of Buffer Over flows.
Scripting for Security Professional:
Ruby and Python for Information Security
Java Scripting for Security Professionals
Exploitation Research
Windows App Reverse Engineering
- Debuggers
- Stack and Heap Overflow
- Kernel Flows
- Automation
Linux App Reverse Engineering
- Debuggers
- Stack and Heap Overflow for Linux OS
- Kernel Flows
- Automation for Linux OS
Malware Analysis
Shell Coding for 32 and 64 bit Application
Static Analysis
Dynamic Analysis
Memory-based Malware
Machine Learning and Artificial Intelligence
Machine Learning using Python
Machine Learning using R
Artificial Intelligence for cyber security