Cyber Awareness Free certificate  Free Certificate

Penetration Testing & Digital Forensics facebook

Certificate in Penetration Testing & Digital Forensics (CPTDF)


 

Duration
7 MONTHS

Fee (INR)
₹ 50,000

As per surveyed by reputed company, On average aprx. 30,000 new website are hacked everyday and attempt cyber attacked on Network.

Penetration testing and Vulnerability scanning and can also test an organizations ability to detect intrusions and breaches. Organizations need to scan the external available infrastructure and applications to protect against external threats.

Since digital devices such as computers are vulnerable to attack by criminals, digital forensics is increasing in importance.


Benefits

Start from 0 up to a high-intermediate level.
Learn ethical hacking, its fields & the different types of hackers.
Understand how websites work, how to discover & exploit web application vulnerabilities to hack websites.
Discover vulnerabilities & exploit them to hack into servers.
Hack secure systems using client-side & social engineering.
Secure systems from all the attacks shown.
Learn Network Hacking / Penetration Testing.
Control Wi-Fi connections without knowing the password.
Greatly Job Culture
You can choose government or private sector work in cybersecurity.
Cybersecurity professionals can choose self-employment.
Specialties in cybersecurity provide plentiful career and promotion options.
You can increase your value and earnings potential in cybersecurity easily.
With the right set of cybersecurity skills, recruiters will seek you out
Cybersecurity can provide a real work/life balance.
& more…..


Course Contents

    • ➥ What is Cyber Space?
    • ➥ What is Virtual World?
    • ➥ Career in Cyber Space
    • ➥ Job Opportunities in Hacking & Cyber Security
    • ➥ Roles & Responsibility of Cyber Expert
    • ➥ Job Areas & Designation
    • ➥ Introduction Of Internet
    • ➥ How Does Internet Works?
    • ➥ Internet vs Intranet
    • ➥ Network Introduction
    • ➥ Types of Network
    • ➥ Network Topology
    • ➥ Network Devices
    • ➥ What is LAN, MAN & WAN?
    • ➥ What is IP Address?
    • ➥ Types of IP Address
    • ➥ IP Address and Architecture
    • ➥ What is Internet Service Provider?
    • ➥ Introduction of Web Server/ISP
    • ➥ Devices Used in ISP Architecture
    • ➥ Information Security
    • ➥ Types of Information
    • ➥ CIA Module
    • ➥ Types of Threats to Info. Security
    • ➥ What is Hack?
    • ➥ What is Hacking?
    • ➥ 5 Phases For Hackers & Cyber Expert
    • ➥ Social Engineering
    • ➥ Social Engineering Techniques
    • ➥ What is Social Media?
    • ➥ Negative things on Social Media
    • ➥ Secure Access Of Facebook
    • ➥ Secure Access of Instagram
    • ➥ Secure Access of Whatsapp
    • ➥ Secure Online Banking
    • ➥ Types of Banking Transaction
    • ➥ Steps for Safe Banking Transaction
    • ➥ What is Web Browser?
    • ➥ Different Web Browser
    • ➥ What type of Data Browser Stores?
    • ➥ How hackers steals & use our Data?
    • ➥ How to Secure Browser?
    • ➥ What is Browser extension?
    • ➥ How to use or download extension?
    • ➥ Email Option
    • ➥ Email Security
    • ➥ Introduction to Digital Data & Security
    • ➥ Prevent Data from Cut, Copy And Paste
    • ➥ Restrict Pen Drive from Computer
    • ➥ USB Port Security
    • ➥ USB drive & Storage Devices Security
    • ➥ Monitoring Folder Activity
    • ➥ Unrecoverable Delete
    • ➥ Tracking Computer Activity
    • ➥ Virus Protected Computer With Antivirus
    • ➥ Remove Malware, Spyware, Rootkit , Backdoor, Trojan From Computer
    • ➥ Computer Security
    • ➥ Window TIPs
    • ➥ What is Portable USB PC?
    • ➥ Why It's Important in Digital Security?
    • ➥ Create USB PC using Portable Apps.
    • ➥ Working of USB PC
    • ➥ What is Windows Registry?
    • ➥ Importance of Windows Registry
    • ➥ How to open Win Reg?
    • ➥ How to Back up Windows Registry?
    • ➥ Important Techniques of Win. Reg.
    • ➥ Funny Techniques of Win. Reg.
    • ➥ What is Cloud Technology?
    • ➥ Paid & Free Clouds
    • ➥ File Sharing Using Cloud System
    • ➥ Google Drive & Dropbox.Com
    • ➥ Top 10 Cloud Storages
    • ➥ What is Linux?
    • ➥ What is Kali Linux?
    • ➥ Introduction of Offensive Security
    • ➥ How to Download Kali Linux?
    • ➥ Kali Linux : OS for Hackers
    • ➥ Live USB of Kali Linux
    • ➥ Introduction of virtualisation Technology
    • ➥ What is Virtual Machines?
    • ➥ How to Download VM?
    • ➥ How to install VM in Windows?
    • ➥ How To Install Kali Linux in Vmware/Virtual Box?
    • ➥ Installing Dual Boot Kali Linux
    • ➥ One Step Kali Installation in VM
    • ➥ Introduction Of Penetration Testing
    • ➥ Need Of Penetration Testing
    • ➥ Security Audits Vs Vulnerability Assessment Vs Pen Test
    • ➥ Types Of Penetration Testing
    • ➥ Real world Penetration Testing Team Video
    • ➥ Phases Of Penetration Testing
    • ➥ Security Testing Methodology
    • ➥ Foot-printing Concept
    • ➥ Benefits Of Foot-printing
    • ➥ Foot-printing Methodology
    • ➥ Foot-printing Through Search Engine
    • ➥ Foot-printing Using Advanced Google Hacking Techniques
    • ➥ GHDB Database
    • ➥ Search Diggity Tool
    • ➥ Foot-printing Through Social Networking Websites
    • ➥ Website Foot-printing
    • ➥ WHOIS Foot-printing
    • ➥ DNS Foot-printing
    • ➥ Recon-NG
    • ➥ Cyber Crime Introduction
    • ➥ Types of Cyber Crime
    • ➥ IT ACT 2008
    • ➥ Cyber Crime Cases
    • ➥ Cyber Law
    • ➥ What is Server Log?
    • ➥ Introduction of Nodal/Grievance officer
    • ➥ What is Email?
    • ➥ How Email Works?
    • ➥ Top 5 Email Services for Regular Users
    • ➥ Top 5 Email Services used by Corporates
    • ➥ What is Email Tracing & Tracking?
    • ➥ Find Root Of Email
    • ➥ What is Email Spoofing?
    • ➥ Email Spoofing Techniques
    • ➥ What is Encrypted Email Service?
    • ➥ Top 5 Encrypted Email Service
    • ➥ The reality
    • ➥ What is Data Loss?
    • ➥ Your responsibility
    • ➥ Common Computer Problems
    • ➥ What Causes Data Loss?
    • ➥ How to Prevent Data Loss?
    • ➥ Data Backup
    • ➥ Backup Hardware
    • ➥ After Backup
    • ➥ Data Recovery
    • ➥ Data Recovery TIPs
    • ➥ Data Recovery Techniques
    • ➥ Data Recovery Software's
    • ➥ Use of machines to recover data
    • ➥ Scanning Probe Microscopy (SPM)
    • ➥ Magnetic Force Microscopy (MFM)
    • ➥ Scanning Tunnelling Microscopy (STM)
    • ➥ Data Destroy
    • ➥ Tools for Data Destroy
    • ➥ Cyber Fraud Detection
    • ➥ What is Social Media Fraud?
    • ➥ What is Fake Profile?
    • ➥ What is Imposter Profile?
    • ➥ Types of Social Media Frauds
    • ➥ Fake Facebook Profile Detection
    • ➥ Fake Instagram Profile Detection
    • ➥ Other Social Media Fake Profile Detection
    • ➥ Tracking & Tracing Process of Fake/Imposter Profile
    • ➥ Required Document from Victim of Social Media Fraud
    • ➥ Process of Deleting Fake/Imposter Profile
    • ➥ How to write a Report on Social Media Fraud?
    • ➥ How to complaint in Cyber Cell?
    • ➥ Report online for Cyber Crime?
    • ➥ Reporting For Private Investigation
    • ➥ Introduction to Financial Frauds
    • ➥ What is ATM cards?
    • ➥ Types of ATM Cards
    • ➥ What is Offline Banking?
    • ➥ What is Online Banking?
    • ➥ What is Virtual Wallet?
    • ➥ What is Virtual Card?
    • ➥ What is UPI?
    • ➥ What is Payment Gateways?
    • ➥ How to build own Payment Gateway?
    • ➥ How online Fraud done?
    • ➥ How to Investigate all types of Financial Fraud?
    • ➥ Required Document from Victim of Online Financial Fraud
    • ➥ How to Report in Bank?
    • ➥ How to complaint in Cyber Cell?
    • ➥ Report online for Cyber Crime?
    • ➥ Reporting For Private Investigation
    • ➥ What is Website?
    • ➥ Types of Website
    • ➥ What is Domain?
    • ➥ What is Web Hosting?
    • ➥ Types of Web Hosting Servers
    • ➥ Top 5 Web Hosting Providers
    • ➥ What is Database in Website?
    • ➥ What is front-end & Back-end?
    • ➥ How Database is connected to website?
    • ➥ What is SQL?
    • ➥ Command to manipulate database
    • ➥ What is Phishing?
    • ➥ How to create phishing page?
    • ➥ How to send and grab credentials using Phishing links?
    • ➥ What is Dos & DDos attack?
    • ➥ Network and Website DoS attack methods
    • ➥ What is SQL Injection?
    • ➥ Types of SQL Injection
    • ➥ SQL Login bypass
    • ➥ Website data dump using SQL Map
    • ➥ Digital Forensic
    • ➥ What Is Forensic?
    • ➥ Why Does Forensic Require?
    • ➥ Computer Forensic
    • ➥ MD5, SHA1, SHA256 Hash Techniques
    • ➥ Image Cloning
    • ➥ Types of Cryptography/Steganography
    • ➥ Tools for Cryptography/Steganography
    • ➥ Nirlauncher Utilities
    • ➥ Network Forensic
    • ➥ Registry Forensic
    • ➥ Browser Forensic
    • ➥ ID Search : Data Indexing
    • ➥ What is Cellular Technology?
    • ➥ What is 2G,3G,4G & 5G Technology?
    • ➥ How Cell Tower works?
    • ➥ How Mobile Networks Works?
    • ➥ Devices on Cell Tower?
    • ➥ What is CDR?
    • ➥ Types of CDR
    • ➥ What is Cell ID?
    • ➥ What is MCC & MNC?
    • ➥ What is CGI?
    • ➥ Understanding CDR Files
    • ➥ Trace Spoof Mobile Call
    • ➥ Applications for Virtual Numbers
    • ➥ Mobile Number Hacking/Spoofing
    • ➥ Introduction to Malware
    • ➥ Malware Example
    • ➥ Malware Propagation
    • ➥ Trojan Concept
    • ➥ Use of Trojan by hacker
    • ➥ Infecting Systems through Trojan
    • ➥ Deploying Trojan
    • ➥ Virus And warm
    • ➥ Stage of Virus Life
    • ➥ Working With Viruses
    • ➥ Ransomware
    • ➥ Types Of Virus
    • ➥ Computer Warms
    • ➥ Malware Reverse Engineering
    • ➥ Malware analysis Procedure
    • ➥ Malware Detection
    • ➥ Detecting Trojans
    • ➥ Detecting Viruses
    • ➥ Introduction to Keyloggers/RATS
    • ➥ Types of Keyloggers/RATS
    • ➥ Incidence Management
    • ➥ Benefits of Incidence Management
    • ➥ The Incidence Management Process
    • ➥ Best Practice For Implementing Management
    • ➥ Importance Of Security Policy
    • ➥ Acceptable Encryption Policy
    • ➥ Acceptable Use Policy
    • ➥ Clean Desk Policy
    • ➥ Data Breach Response Policy
    • ➥ Disaster Recovery Plan Policy 58
    • ➥ Digital Signature Acceptance Policy
    • ➥ Email Policy
    • ➥ Ethics Policy
    • ➥ Pandemic Response Planning Policy
    • ➥ Password Construction Guideline
    • ➥ Password Protection Policy
    • ➥ Security Response Plan Policy
    • ➥ End Users Encryption Key protection Policy
    • ➥ Acquisition Assessment Policy
    • ➥ Bluetooth Baseline Requirements Policy
    • ➥ Remote Access Police
    • ➥ Remote Access Tools Policy
    • ➥ Router And Switch Security Policy
    • ➥ Wireless Communication Policy
    • ➥ Wireless Communication Standard
    • ➥ Database Credentials Policy
    • ➥ Technology Equipment Disposal Policy
    • ➥ Information Logging Standard
    • ➥ Lab Security Policy
    • ➥ Server Security Policy
    • ➥ Software Installation Policy
    • ➥ Workstation Security Policy
    • ➥ Application Security
    • ➥ Web Application Security Policy
    • ➥ Network Foot-printing
    • ➥ Network Scanning
    • ➥ Network Mapping
    • ➥ TCP Communication
    • ➥ Creating Custom Data Packets Using TCP Flags
    • ➥ Live System Scanning
    • ➥ Port Scanning
    • ➥ Scanning Beyond IDS
    • ➥ Banner Grabbing
    • ➥ Tech of Enumeration
    • ➥ Netbios Enumeration
    • ➥ Netbios Enumeration Tool: Superscan
    • ➥ Tool: Net BIOS Enumeration
    • ➥ NBT State, Super Scan
    • ➥ ID Server, Nmap, NetCat, Net Craft, CURL
    • ➥ NET Penetration Testing Using Android
    • ➥ Proxy Preparing
    • ➥ Proxy Chaining
    • ➥ Proxy Tools
    • ➥ Proxy & VPN
    • ➥ IP Spoofing
    • ➥ IP Spoofing Detection-IP Identification Number
    • ➥ IP Spoofing Detection-Direct TTL Probes
    • ➥ IP Spoofing Counter Measures
    • ➥ Scanning Pen Testing
    • ➥ MAC Spoofing-SMAC
    • ➥ Defend Against MAC Spoofing
    • ➥ What Is Sniffer?
    • ➥ Types of Sniffer: Passive Sniffer/Active Sniffer
    • ➥ Sniffer: Wireshark CACE Pilot
    • ➥ Password Sniffer: ACE
    • ➥ Employee Tracking Active Track
    • ➥ Packet Sniffer Capsa Network
    • ➥ Sniffing Prevention/ Detection Technique
    • ➥ Data Security With Registry
    • ➥ Browser Forensics
    • ➥ Computer Forensics
    • ➥ Improve Performance
    • ➥ Hives
    • ➥ Backup and Recovery
    • ➥ Comandline Editing
    • ➥ OS, BIOS Password
    • ➥ Recovery (Windows, Linux)
    • ➥ Password Recovery And Dumping (Passcap)
    • ➥ Application Password Cracking
    • ➥ Wifi- Password Recovery
    • ➥ Strong And Unbreakable Password
    • ➥ Social Media Profile Analysis
    • ➥ Find Compromised Password
    • ➥ Foot-printing Using Script
    • ➥ Anonymous Location Tracking
    • ➥ Ten Plus Scripts
    • ➥ What is Metasploit?
    • ➥ How to Run Metasploit?
    • ➥ Metasploit Basic Command Tutorial
    • ➥ Metasploit Desktop Exploit
    • ➥ Advanced Penetration Using Metasploit
    • ➥ Integrated Nessus With MT And Kali Linux
    • ➥ Autopwn Metasploit
    • ➥ Vulnerability Assessment
    • ➥ Type of Vulnerability Assessment
    • ➥ Vulnerability Research
    • ➥ Web Server Attacks
    • ➥ Website Attacks Methodology
    • ➥ Website Information Gathering
    • ➥ Web Server Foot-printing
    • ➥ Mirroring a Website
    • ➥ Vulnerability Scanning
    • ➥ Web Server Security Scanner: Acunetix Scanner
    • ➥ What Exactly Is a Bug Bounty?
    • ➥ How Do Bug Bounties Work?
    • ➥ How Does a Bug Bounty Program Work?
    • ➥ How to Get Started with Bug Bounty?
    • ➥ Bug Bounty Program Examples
    • ➥ Getting started with Burp Suite
    • ➥ Intercepting HTTP traffic with Burp Proxy
    • ➥ Setup Manual Proxy in Browser
    • ➥ Setup Manual Proxy with Add-on in Browser
    • ➥ Parameter/ Form Temporising
    • ➥ Modifying HTTP requests with Burp Proxy
    • ➥ Reissue requests with Burp Repeater
    • ➥ Testing different input with Burp Repeater
    • ➥ Run your first scan with Burp Scanner
    • ➥ Getting started with Burp Intruder
    • ➥ DVWA Introduction
    • ➥ How to install DVWA on Windows
    • ➥ How to use the Damn Vulnerable Web Application?
    • ➥ Brute Force
    • ➥ Command Injection
    • ➥ Cross Site Request Forgery Attacks (CSRF)
    • ➥ ClickJacking Attack
    • ➥ SPF-DKIM-DMARC Records
    • ➥ EXIF Data
    • ➥ No Rate Limit Bypass
    • ➥ Bug Bounty Hunter - Account Creation
    • ➥ Open Redirection
    • ➥ Cross Site Scripting Attacks (XSS) & Types
    • ➥ Access control vulnerabilities-Session Hijacking & privilege escalation
    • ➥ Indirect Object Reference (IDOR)
    • ➥ Invalidate session after password reset
    • ➥ File upload Vulnerability
    • ➥ Directory Traversal
    • ➥ WordPress Security Scanner-Wpscan
    • ➥ Local File Inclusion & Remote file Inclusion
    • ➥ Cloud Computing
    • ➥ Types Of Cloud Computing Services
    • ➥ SaaS (Software as a Service)
    • ➥ LaaS (Infrastructure as a Service)
    • ➥ PaaS (Platform as a Service)
    • ➥ NaaS ( Network as a Service)
    • ➥ XaaS (Anything as a Service)
    • ➥ Social Engineering Toolkit
    • ➥ Wireless Concept
    • ➥ Wireless technologies
    • ➥ Service Set Identifier (SSID)
    • ➥ WiFi Authentication Modes
    • ➥ WiFi Chalking
    • ➥ Wireless Antenna
    • ➥ Wireless Encryption
    • ➥ WEP Encryption
    • ➥ WPA Encryption
    • ➥ WPA2 Encryption
    • ➥ Wireless Hacking Methodology
    • ➥ WiFi Discovery
    • ➥ GPS Mapping
    • ➥ Wireless Traffic Analysis
    • ➥ Launch Wireless Attack
    • ➥ Crack Wireless Encryption
    • ➥ WiFi Jammer / Signal Blocking
    • ➥ Rouge Access Point
    • ➥ Fluxion / AirGeddon WiFi Attack
    • ➥ Secure WiFi Router
    • ➥ Security For Smart phones
    • ➥ Anti Virus for Android
    • ➥ Android phones Rooting
    • ➥ Mobile Spy-Android/IPhone
    • ➥ Droid Jack-Remote Phone Hack
    • ➥ Application For Rooted And Android Phone
    • ➥ Networking Hacking Using Mobile Phone (Android)
    • ➥ Penetration Testing in Root Word
    • ➥ Latest Tools & Techniques
    • ➥ What is Mobile Application?
    • ➥ Smart Phone Application for Routine Life
    • ➥ Application for Smart Phone Security
    • ➥ Paid apps for free of Cost
    • ➥ Earning from Mobiles Apps
    • ➥ Installing and Configuring Firewalls
    • ➥ Employee System Monitoring
    • ➥ Call Monitoring Systems - Tellecallers
    • ➥ End Point Security Solutions
    • ➥ Report Tracking and Management

Download Brochure

Eligibility

12th or Equivalent.

For Whom?

Student
IT Professional
Security Analyst
Network Engineer
Other Professional
Police
Lawyer
IT Expert
Forensic Expert
Judges

Career Opportunities

Consulting for Cyber Security
Consulting for Vulnerability Scanning
Cyber Expert
Penetration Test Engineer
Digital Forensics Expert

Student Kit

  Book
  Printable Digital Copy Material
  Laptop bag
  Necessary Tool (Academic Version)
  Course Certificate