Certificate in Penetration Tester & Forensic Expert facebook

CPT&FE Course Content

Duration : 6 Months
Fees : Rs 34,500 (including GST)
  1. Introduction
    • What is Cyber Space?
    • What is Cyber Security?
    • What is Cyber Crime ?
    • IT Act.2000 & 2008
    • What is Hacker & Hacking?
    • Type of Hackers
    • Hackers & Hacking Methodologies
    • Malicious Hacker Strategies
    • Different between Hacking & Penetration Testing
  2. Computer Security
    • Computer Data Theft Security
    • Data Prevention Techniques
    • Computer Data Indexing
    • Data Hiding & Encryption
    • Windows Logon Password Breaking
    • Simple .Bat virus for crash PC & HDD
    • Damaged Office File Recovery
    • Windows restore Point
    • Windows backup and Security
    • Windows Registry
    • BIOS Password Cracking
    • Windows Error Solving
    • Windows MBR File Recovery
    • Auto Copy for Windows (Steal someone's Data Silently)
  3. Internet Networks & Web Security
    • Internet : Tour Behind Internet
    • What is Internet?
    • Benefits of Internet
    • What is Network?
    • Types of Network
    • Benefits of Network
    • How Internet Works : Inside Networks
    • How Network & Internet Works?
    • IP Address : Understand Internet Protocol
    • Structure of an IP address
    • Internal IP & External IP Address
    • Class of IP addresses
    • Different types of Protocols
    • ISP : Internet Service Providers
    • How ISP works?
    • ISP Log Maintenance System
    • Different types of ISP
    • Technology and Devices Used by ISP
    • Domain Name Server
    • Top Level Domain & Country Code Top Level Domain
    • Web Hosting & Web Space
    • Web Server & Technology
    • Browser Security
    • What is Browser?
    • Importance of Browsers in Internet
    • Cloud System : Online Storage System
    • Understanding Cloud Technology
    • Different Cloud Based Services
    • Cloud Security and Storage Technology
    • Social Website Security
    • Email Website Security
    • Internet Banking Website Security
    • Shopping Website Security
    • Digital Wallets
  4. Network Vulnerabilities, Penetration Testing & Attacks
    • Advance Network Scanning
    • Network Auditing
    • Advance Port Scanning
    • Network PC View
    • IP & MAC address Scanning
    • Advance Network Security
    • Control victim’s computer using Trojans
    • Hack Cut, Copy & Paste
    • Hack Remote Desktop
    • Malicious Activity on Victims PC
    • Encrypt Someone's Sensitive Data
    • Control Over Victims PC & Network
  1. Web Vulnerabilities, Penetration Testing & Attacks
    • Hosting Servers
    • Registrant and Hosting Panels
    • Static and Dynamic Websites
    • Pre-penetration Steps
    • Information Scanning
    • Email Spoofing
    • Hacking using Google
    • Finding Control Panel of Websites
    • Breaking Cpanel
    • Phishing
    • Web Foot-Printing
    • Webserver Hacking
    • Rooting & Shellcoding
    • Encryption / Decryption
    • XSS Attacks
    • Securing XSS Attacks
    • SQL Penetration Testing
    • Normal And Blind SQLi
    • Wordpress Exploits
    • DDOS Attack
    • Vbulletin Exploits
  2. Wireless Security & Penetration Testing Using Kali Linux
    • Introduction of Kali Linux
    • Dual Installation Of Kali Linux
    • A to Z commands of Kali Linux
    • SET: Social Engineering Toolkit
    • Wireless Protocols
    • Wireless Routers-Working
    • Cracking Wireless routers password(WEP)
    • Attacking WEP Protected 802.11 Networks
    • Attacking WPA/WPA2 Protected 802.11 Networks
    • Securing routers from Hackers
    • Real-World ISP Network Scanning
  3. Smart Phone Security & Tacking
    • Smart Phone Applications
    • Android Rooting
    • Smart Phone Apps for Hacking
    • Smart Phone Apps for Penetration Testing
    • Recover Android Pattern Lock
    • Smart Phone Tracking and Security
  4. Cyber Crime Investigation & Evidence Collection
    • Fraud Email Tracing & Investigation
    • Email Tracking & Tracing
    • Root of Email Tracking
    • Email Fraud Investigation
    • Fraud Facebook Account Tracing & Investigation
    • Facebook Fake Profile Detection
    • Hacked Profile/Page Investigation
    • Facebook Profile Forensics
    • Facebook Security Auditing
    • Online Fraud Services Tracing & Investigation
    • Banking Fraud Investigation
    • ATM Fraud Investigation
    • Online Banking & Shopping Fraud Investigation
  5. Computer & Digital Forensics
    • Computer Live Forensics
    • Basic forensics concept
    • Regedit policies
    • Advance Computer Forensic
    • Advance Regedit Scanning
    • Connected Device History
    • Install, Uninstalled Programs History
    • Advance Full System Forensics Report
    • Browser Forensics
    • URL History View
    • Password Dumps
    • Download History View
    • Advance Browser Forensics
  6. Cyber Crime Reporting
    • Report for Social Networking Sites
    • Report For Email Services
    • Report for Data Recovery & Forensic
    • Report for ATM Fraud Detection
    • Report for IT Policy Implementation
    • Report For Network Scanning
  7. Live Training
    • Real Time Training
    • Live Research
  8. Currant Tools & Trends
p