Expert Advice Logo  Expert Advice

Penetration Testing & Digital Forensics facebook

Certificate in Penetration Testing & Digital Forensics (CPTDF)


 

Duration
7 MONTHS

Fee (INR)
₹ 40,000

As per surveyed by reputed company, On average aprx. 30,000 new website are hacked everyday and attempt cyber attacked on Network.

Penetration testing and Vulnerability scanning and can also test an organizations ability to detect intrusions and breaches. Organizations need to scan the external available infrastructure and applications to protect against external threats.

Since digital devices such as computers are vulnerable to attack by criminals, digital forensics is increasing in importance.


Benefits

Start from 0 up to a high-intermediate level.
Learn ethical hacking, its fields & the different types of hackers.
Understand how websites work, how to discover & exploit web application vulnerabilities to hack websites.
Discover vulnerabilities & exploit them to hack into servers.
Hack secure systems using client-side & social engineering.
Secure systems from all the attacks shown.
Learn Network Hacking / Penetration Testing.
Control Wi-Fi connections without knowing the password.
& more…..


Course Contents

    • ➥ Introduction Of Internet
    • ➥ How Does Internet Works?
    • ➥ Network Introduction
    • ➥ IP Address and Architecture
    • ➥ Introduction of Web Server/ISP
    • ➥ Devices Used in ISP Architecture
    • ➥ Information Security
    • ➥ Hacking Explained
    • ➥ 5 Phases For Hackers & Investigator
    • ➥ Social Engineering
    • ➥ Social Engineering Techniques
    • ➥ Need Of Ethical Hacker
    • ➥ Kali Linux : OS for Hackers
    • ➥ How To Install Kali Linux in VMware
    • ➥ Installing Dual Boot Kali Linux
    • ➥ Live USB of Kali Linux
    • ➥ Introduction Of Penetration Testing
    • ➥ Need Of Penetration Testing
    • ➥ Security Audits Vs Vulnerability Assessment Vs Pen Test
    • ➥ Types Of Penetration Testing
    • ➥ Phases Of Penetration Testing
    • ➥ Security Testing Methodology
    • ➥ Footprinting Concept
    • ➥ Benefits Of Footprinting
    • ➥ Footprinting Methodology
    • ➥ Footprinting Through Search Engine
    • ➥ Footprinting Using Advanced Google Hacking Techniques
    • ➥ GHDB Database
    • ➥ Search Diggity Tool
    • ➥ Footprinting Through Social Networking Websites
    • ➥ Website Footprinting
    • ➥ WHOIS Footprinting
    • ➥ DNS Footprinting
    • ➥ Recon-NG
    • ➥ Browser Security
    • ➥ Email Option
    • ➥ Email Security
    • ➥ Secure Access Of Facebook
    • ➥ Secure Use of Twitter
    • ➥ Banking Transaction
    • ➥ Secure And Safe Banking Transaction
    • ➥ Introduction to Digital Data & Security
    • ➥ Prevent Data from Cut, Copy And Paste
    • ➥ Restrict Pen Drive from Computer
    • ➥ USB Port Security
    • ➥ USB drive & Storage Devices Security
    • ➥ Monitoring Folder Activity
    • ➥ Unrecoverable Delete
    • ➥ Tracking Computer Activity
    • ➥ Virus Protected Computer With Antivirus
    • ➥ Remove Malware, Spyware, Rootkit , Backdoor, Trojan From Computer
    • ➥ Computer Security
    • ➥ Window Tips
    • ➥ File Sharing Using Cloud System
    • ➥ Google Drive & Dropbox.Com
    • ➥ Funny Tricks Using Regedit
    • ➥ Cyber Crime Introduction
    • ➥ Types of Cyber Crime
    • ➥ Cyber Law
    • ➥ Server Log
    • ➥ Email Tracing And Tracking
    • ➥ Root Of Email
    • ➥ Email Spoofing
    • ➥ Proton Mail : Encrypted Email Service
    • ➥ Morphing Detection
    • ➥ Data Recovery
    • ➥ Data Destroy
    • ➥ Cyber Fraud Detection
    • ➥ Fake Facebook Profile Detection
    • ➥ Fake Instagram Profile Detection
    • ➥ ATM Card Fraud Investigation
    • ➥ Virtual Wallet & Security
    • ➥ Virtual Card & Security
    • ➥ Basics Of Website Hacking
    • ➥ DoS/DDoS Attack Tool
    • ➥ Website Phishing
    • ➥ Digital Forensic
    • ➥ What Is Forensic?
    • ➥ Why Does Forensic Require?
    • ➥ Computer Forensic
    • ➥ MD5, SHA1, SHA256 Hash Techniques
    • ➥ Image Cloning
    • ➥ Types of Cryptography/Steganography
    • ➥ Tools for Cryptography/Steganography
    • ➥ Nirlauncher Utilities
    • ➥ Network Forensic
    • ➥ Registry Forensic
    • ➥ Browser Forensic
    • ➥ ID Search : Data Indexing
    • ➥ Trace Spoof Mobile Call
    • ➥ Cell Towers and Mobile Networks
    • ➥ Mobile Number Hacking
    • ➥ Introduction to Malware
    • ➥ Malware Example
    • ➥ Malware Propagation
    • ➥ Trojan Concept
    • ➥ Use of Trojan by hacker
    • ➥ Infecting Systems through Trojan
    • ➥ Deploying Trojan
    • ➥ Virus And warm
    • ➥ Stage of Virus Life
    • ➥ Working With Viruses
    • ➥ Ransomware
    • ➥ Types Of Virus
    • ➥ Computer Warms
    • ➥ Malware Reverse Engineering
    • ➥ Malware analysis Procedure
    • ➥ Malware Detection
    • ➥ Detecting Trojans
    • ➥ Detecting Viruses
    • ➥ Introduction to Keyloggers/RATS
    • ➥ Types of Keyloggers/RATS
    • ➥ Incidence Management
    • ➥ Benefits of Incidence Management
    • ➥ The Incidence Management Process
    • ➥ Best Practice For Implementing Management
    • ➥ Importance Of Security Policy
    • ➥ Acceptable Encryption Policy
    • ➥ Acceptable Use Policy
    • ➥ Clean Desk Policy
    • ➥ Data Breach Response Policy
    • ➥ Disaster Recovery Plan Policy 58
    • ➥ Digital Signature Acceptance Policy
    • ➥ Email Policy
    • ➥ Ethics Policy
    • ➥ Pandemic Response Planning Policy
    • ➥ Password Construction Guideline
    • ➥ Password Protection Policy
    • ➥ Security Response Plan Policy
    • ➥ End Users Encryption Key protection Policy
    • ➥ Acquisition Assessment Policy
    • ➥ Bluetooth Baseline Requirements Policy
    • ➥ Remote Access Police
    • ➥ Remote Access Tools Policy
    • ➥ Router And Switch Security Policy
    • ➥ Wireless Communication Policy
    • ➥ Wireless Communication Standard
    • ➥ Database Credentials Policy
    • ➥ Technology Equipment Disposal Policy
    • ➥ Information Logging Standard
    • ➥ Lab Security Policy
    • ➥ Server Security Policy
    • ➥ Software Installation Policy
    • ➥ Workstation Security Policy
    • ➥ Application Security
    • ➥ Web Application Security Policy
    • ➥ network Footprinting
    • ➥ Network Scanning
    • ➥ Network Mapping
    • ➥ TCP Communication
    • ➥ Creating Custom Data Packets Using TCP Flags
    • ➥ Live System Scanning
    • ➥ Port Scanning
    • ➥ Scanning Beyond IDS
    • ➥ Banner Grabbing
    • ➥ Tech of Enumeration
    • ➥ Netbios Enumeration
    • ➥ Netbios Enumeration Tool: Superscan
    • ➥ Tool: Net BIOS Enumeration
    • ➥ NBT State, Super Scan
    • ➥ ID Server, Nmap, NetCat, Net Craft, CURL
    • ➥ NET Penetration Testing Using Android
    • ➥ Proxy Preparing
    • ➥ Proxy Chaining
    • ➥ Proxy Tools
    • ➥ Proxy & VPN
    • ➥ Ip Spoofing
    • ➥ Ip Spoofing Detection-Ip Identification Number
    • ➥ Ip Spoofing Detection-Direct TTL Probes
    • ➥ Ip Spoofing Counter Measures
    • ➥ Scanning Pen Testing
    • ➥ MAC Spoofing-SMAC
    • ➥ Defend Against MAC Spoofing
    • ➥ What Is Sniffer
    • ➥ Types of Sniffer:Passive Sniffer/Active Sniffer
    • ➥ Sniffer: Wireshark CACE Pilot
    • ➥ Password Sniffer: ACE
    • ➥ Employee Tracking Active Track
    • ➥ Packet Sniffer Capsa Network
    • ➥ Sniffing Prevention/ Detection Technique
    • ➥ OS, BIOS Password
    • ➥ Recovery (Windows, Linux)
    • ➥ Password Recovery And Dumping (Passcap)
    • ➥ Application Password Cracking
    • ➥ Wifi- Password Recovery
    • ➥ Strong And Unbreakable Password
    • ➥ Metasploit Basic Command Tutorial
    • ➥ Metasploit Desktop Exploit
    • ➥ Advanced Penetration Using Metasploit
    • ➥ Integrated Nessus With MT And Kali Linux
    • ➥ Autopwn Metasploit
    • ➥ Vulnerability Assessment
    • ➥ Type of Vulnerability Assessment
    • ➥ Vulnerability Research
    • ➥ Web Server Attacks
    • ➥ Website Attacks Methodology
    • ➥ Website Information Gathering
    • ➥ Web Server Footprinting
    • ➥ Mirroring a Website
    • ➥ Vulnerability Scanning
    • ➥ Web Server Security Scanner: Acunetix Scanner
    • ➥ Burp Suites Professional - Vulnerability Scanner
    • ➥ Session Hijacking
    • ➥ Hacking Web Passwords
    • ➥ Web Application Hacking
    • ➥ Web Application Threats
    • ➥ Invalidated Input
    • ➥ Parameter/ Form Temporizing
    • ➥ Directory Traversal
    • ➥ Security Misconfiguration
    • ➥ Cross Site Scripting Attacks (XSS)
    • ➥ Cross Site Request Forgery Attacks (CSRF)
    • ➥ Denial of Service Attacks in Web Application
    • ➥ Web Application Hacking Tools
    • ➥ SQL Injection Concept
    • ➥ Types of SQL Injection
    • ➥ Error Base SQL Injection
    • ➥ Blind SQL Injection
    • ➥ SQL Injection Tools (Desktop & Mobiles)
    • ➥ Wordpress Security Scanner-Wpscan
    • ➥ Cloud Computing
    • ➥ Types Of Cloud Computing Services
    • ➥ SaaS (Software as a Service)
    • ➥ LaaS (Infrastructure as a Service)
    • ➥ PaaS (Platform as a Service)
    • ➥ NaaS ( Network as a Service)
    • ➥ XaaS (Anything as a Service)
    • ➥ Social Engineering Toolkit
    • ➥ Wireless Concept
    • ➥ Wireless technologies
    • ➥ Service Set Identifier (SSID)
    • ➥ WiFi Authentication Modes
    • ➥ WiFi Chalking
    • ➥ Wireless Antenna
    • ➥ Wireless Encryption
    • ➥ WEP Encryption
    • ➥ WPA Encryption
    • ➥ WPA2 Encryption
    • ➥ Wireless Hacking Methodology
    • ➥ WiFi Discovery
    • ➥ GPS Mapping
    • ➥ Wireless Traffic Analysis
    • ➥ Launch Wireless Attack
    • ➥ Crack Wireless Encryption
    • ➥ WiFi Jammer / Signal Blocking
    • ➥ Rouge Access Point
    • ➥ Fluxion / AirGeddon WiFi Attack
    • ➥ Secure WiFi Router
    • ➥ Security For Smart phones
    • ➥ Anti Virus for Android
    • ➥ Android phones Rooting
    • ➥ Mobile Spy-Android/Iphone
    • ➥ Droid Jack-Remote Phone Hack
    • ➥ Application For Rooted And Android Phone
    • ➥ Networking Hacking Using Mobile Phone (Android)
    • ➥ Penetration Testing in Root Word
    • ➥ Latest Tools & Techniques


Eligibility

12th or Equivalent.

For Whom?

Student
IT Professional
Security Analyst
Network Engineer
Other Professional
Police
Lawyer
IT Expert
Forensic Expert
Judges

Career Opportunities

Consulting for Cyber Security
Consulting for Vulnerability Scanning
Cyber Expert
Penetration Test Engineer
Digital Forensics Expert

Student Kit

  Book
  Printable Digital Copy Material
  Laptop bag
  Necessary Tool (Academic Version)
  Course Certificate