Advance Diploma on Information Security

Course Covers: Ethical Hacking, Network Security, Web application Security & Exploit Writing
4 Certification & 1 Advance Diploma on Information Security
Program Duration: 300 Hrs. / 12 Months
Pre-requisite: Basic Knowledge of Computers and Internet

Training Module – L1: ETHICAL HACKING

Training Module – L2: WEB APP SECURITY
• Chapter 1 – Web Architectures
• Chapter 2 – Web Application Introduction
• Chapter 3 – PHP-Basics
• Chapter 4 – Sessions & Cookies
• Chapter 5 – XSS Attacks
• Chapter 6 – Advanced SQLI
• Chapter 7 – Cross Site Request Forgery
• Chapter 8 – Session Hijacking
• Chapter 9 – Web based DDOS Attacks
• Chapter 10 – Cookie Poisoning
• Chapter 11 – PHP Injection
• Chapter 12 – Web Based Worms
• Chapter 13 – Flash based Web Attacks
• Chapter 14 – I-Frame based Web Attacks
• Chapter 15 – Clickjacking
• Chapter 16 – Attack frameworks: AttackAPI & BeEF
• Chapter 17 – Penetration testing on DVWA
• Chapter 18 – Honeytokens
• Chapter 19 – OWASP Top 10
• Chapter 20 – Metasploit and Web Application
• Chapter 21 – PHP Curl
• Chapter 22 – Automated Bots
• Chapter 23 – Phishing 2.0
• Chapter 24 – Brute forcing Web Applications
• Chapter 25 – Compliance Methodologies and Legalities
• Chapter 26 – Capture the Flag Exercise
• Chapter 27 – Summary

Training Module – L2: NETWORK SECURITY 
• Chapter 1 – Network Topology
• Chapter 2 – Open Systems Interconnectivity Model
• Chapter 3 – TCP/IP In-depth
• Chapter 4 – WAP, NAT, DNS and ICMP
• Chapter 5 – Internet Routing
• Chapter 6 – Advanced Port Scanning
• Chapter 7 – Sniffing Attacks
• Chapter 8 – Masquerading Attacks
• Chapter 9 – Advanced DOS and DDOS
• Chapter 10 – Session Hijacking Attacks
• Chapter 11 – Network Operations Center – Security
• Chapter 12 – Network Traffic Analysis
• Chapter 13 – Network Vulnerability Assessment
• Chapter 14 – Network Penetration Testing
• Chapter 15 – Intrusion Detection System
• Chapter 16 – Snort 101
• Chapter 17 – OSSEC 102
• Chapter 18 – Intrusion Prevention System
• Chapter 19 – Firewalls (Installation, Configuration and Usage)
• Chapter 20 – OS Hardening for Networks – Linux and Windows
• Chapter 21 – Cryptography – Introduction
• Chapter 22 – Symmetric Key Encryption
• Chapter 23 – Asymmetric Key Encryption
• Chapter 24 – Hash functions
• Chapter 25 – Trust models
• Chapter 26 – VLAN – Security
• Chapter 27 – VPN – Security
• Chapter 28 – Wireless Networks – Introduction
• Chapter 29 – Radio Frequency Essentials
• Chapter 30 – Wireless Security – Basics
• Chapter 31 – Wireless Threats
• Chapter 32 – Attacking Wireless Hotspot and Security
• Chapter 33 – WEP Security
• Chapter 34 – WPA/WPA2 Security
• Chapter 35 – Secure Wireless Infrastructure Deployment
• Chapter 36 – DNS Tunneling
• Chapter 37 – Network Forensic Methodology
• Chapter 38 – Network Evidence Acquisition
• Chapter 39 – OS Logs and Splunk
• Chapter 40 – Summary

Training Module – L2: EXPLOIT WRITING 
• Chapter 1 – Introduction to Exploit Writing
• Chapter 2 – Programming & Basics
• Chapter 3 – Assembly language
• Chapter 4 – Debugging
• Chapter 5 – Stack Based Buffer Overflow
• Chapter 6 – Understanding Windows Shellcode
• Chapter 7 – Fuzzers
• Chapter 8 – Heap Based Overflow
• Chapter 9 – Exploiting /GS Canary Protected Programs
• Chapter 10 – Exploiting SafeSEH Protected Programs
• Chapter 11 – Denial of Service
• Chapter 12 – Bypassing DEP & ASLR
• Chapter 13 – Advanced Shellcoding (Win32 Egghunting, Connect-back, Staged,Alphanumeric)
• Chapter 14 – Encoders & Writing Custom Encoders
• Chapter 15 – DLL Hijacking
• Chapter 16 – Client Side Exploits
• Chapter 17 – From Vulnerability to Exploit
• Chapter 18 – Metasploit Framework
• Chapter 19 – Binary payloads & Antivirus Evasion
• Chapter 20 – Exploit to Metasploit
• Chapter 21 – Capture The Flag Exercise

 

Enquiry