Advance Diploma in Information Security

Cource Content

Ethical Hacking


Chapter 1 - Introduction

Chapter 2 - Networking

Chapter 3 - Footprinting/Reconnaissance

Chapter 4 - Google Hacking-Google Dorks

Chapter 5 - Scanning

Chapter 6 - System Hacking: Win7 and Linux

Chapter 7 - Android & iPhone Hacking

Chapter 8 - Malwares/virus

Chapter 9 - SQL Injection

Chapter 10 - Cross Site Scripting(xss)

Chapter 11 - Sniffing

Chapter 12 - Social Engineering

Chapter 13 - Identity Theft Fraud

Chapter 14 - Denial of Service

Chapter 15 - Session Hijacking

Chapter 16 - Penetration Testing

Chapter 17 - Exploit Writing & Buffer Overflow

Chapter 18 - Cryptography & Steganography

Chapter 19 - Firewalls & Honeypots

Chapter 20 - IDS & IPS

Chapter 21 - Hacking Web Server

Chapter 22 - Wireless Hacking

Chapter 23 - Physical Security

Chapter 24 - Reverse Engineeringx

Chapter 25 - Email Hacking

Chapter 26 - Security Compliance & Auditing

Chapter 27 - Incident Handling & Computer forensics

 

Introduction To LINUX Operating System And Virtual Machines


*Kali Linux

*Back Box

*BackTrack operating ayatems

*Ubuntu

*Parrot os

*virtual Box

*VM ware

 

WEB APPLICATION SECURITY


Chapter 1 - Web Architectures

Chapter 2 - Web Application Introduction

Chapter 3 - PHP-Basics

Chapter 4 - Sessions & Cookies

Chapter 5 - XSS Attacks

Chapter 6 - Advanced SQLI(Bypassing Mod_security)

Chapter 7 - Cross Site Request Forgery

Chapter 8 - Session Hijacking

Chapter 9 - Web based DDOS Attacks

Chapter 10 - PHP Injection

Chapter 11 - Web Based Worms

Chapter 12 - Flash based Web Attacks

Chapter 13 - I-Frame based Web Attacks

Chapter 14 - Clickjacking

Chapter 15 - Attack frameworks: AttackAPI & BeEF

Chapter 16 - Penetration testing on DVWA

Chapter 17 - Honeytokens

Chapter 18 - OWASP Top 10

Chapter 19 - Metasploit and Web Application

Chapter 20 - PHP Curl

Chapter 21 - Automated Bots

Chapter 22 - Phishing 2.0

Chapter 23 - Brute forcing Web Applications

Chapter 24 - Compliance Methodologies and Legalities

 

NETWORK SECURITY


Chapter 1 - Network Topology

Chapter 2 - Open Systems Interconnectivity Model

Chapter 3 - TCP/IP In-depth

Chapter 4 - WAP, NAT, DNS and ICMP

Chapter 5 - Internet Routing

Chapter 6 - Advanced Port Scanning

Chapter 7 - Sniffing Attacks

Chapter 8 - Masquerading Attacks

Chapter 9 - Advanced DOS and DDOS

Chapter 10 - Session Hijacking Attacks

Chapter 11 - Network Operations Center - Security

Chapter 12 - Network Traffic Analysis

Chapter 13 - Network Vulnerability Assessment

Chapter 14 - Network Penetration Testing

Chapter 15 - Intrusion Detection System

Chapter 16 - Snort 101

Chapter 17 - OSSEC 102

Chapter 18 - Intrusion Prevention System

Chapter 19 - Firewalls (Installation, Configuration and Usage)

Chapter 20 - OS Hardening for Networks - Linux and Windows

Chapter 21 - Cryptography - Introduction

Chapter 22 - Symmetric Key Encryption

Chapter 23 - Asymmetric Key Encryption

Chapter 24 - Hash functions

Chapter 25 - Trust models

Chapter 26 - VLAN - Security

Chapter 27 - VPN - Security

Chapter 28 - Wireless Networks - Introduction

Chapter 29 - Radio Frequency Essentials

Chapter 30 - Wireless Security - Basics

Chapter 31 - Wireless Threats

Chapter 32 - Attacking Wireless Hotspot and Security

Chapter 33 - WEP Security

Chapter 34 - WPA/WPA2 Security

Chapter 35 - Secure Wireless Infrastructure Deployment

Chapter 36 - DNS Tunneling

Chapter 37 - Network Forensic Methodology

Chapter 38 - Network Evidence Acquisition

Chapter 39 - OS Logs and Splunk

Chapter 40 - Summary

 

EXPLOIT WRITING


Chapter 1 - Introduction to Exploit Writing

Chapter 2 - Programming & Basics

Chapter 3 - Assembly language

Chapter 4 - Debugging

Chapter 5 - Stack Based Buffer Overflow

Chapter 6 - Understanding Windows Shellcode

Chapter 7 - Fuzzers

Chapter 8 - Heap Based Overflow

Chapter 9 - Exploiting /GS Canary Protected Programs

Chapter 10 - Exploiting SafeSEH Protected Programs

Chapter 11 - Denial of Service

Chapter 12 - Bypassing DEP & ASLR

Chapter 13 - Advanced Shellcoding (Win32 Egghunting, Connect-back, Staged, Alphanumeric)

Chapter 14 - Encoders & Writing Custom Encoders

Chapter 15 - DLL Hijacking

Chapter 16 - Client Side Exploits

Chapter 17 - From Vulnerability to Exploit

Chapter 18 - Metasploit Framework

Chapter 19 - Binary payloads & Antivirus Evasion

Chapter 20 - Exploit to Metasploit

Chapter 21 - Capture The Flag Exercise

DURATION:300HRs

fill the Inquiry Form