Certificate in Penetration Testing & Digital Forensics (CPTDF)
Duration 7 MONTHS
Fee (INR) ₹ 60,000
As per surveyed by reputed company, On average aprx. 30,000 new website are hacked everyday and attempt cyber attacked on Network.
Penetration testing and Vulnerability scanning and can also test an organizations ability to detect intrusions and breaches. Organizations need to scan the external available infrastructure and applications to protect against external threats.
Since digital devices such as computers are vulnerable to attack by criminals, digital forensics is increasing in importance.
Benefits
✔ Start from 0 up to a high-intermediate level. ✔ Learn ethical hacking, its fields & the different types of hackers. ✔ Understand how websites work, how to discover & exploit web application vulnerabilities to hack websites. ✔ Discover vulnerabilities & exploit them to hack into servers. ✔ Hack secure systems using client-side & social engineering. ✔ Secure systems from all the attacks shown. ✔ Learn Network Hacking / Penetration Testing. ✔ Control Wi-Fi connections without knowing the password. ✔ Greatly Job Culture ✔ You can choose government or private sector work in cybersecurity. ✔ Cybersecurity professionals can choose self-employment. ✔ Specialties in cybersecurity provide plentiful career and promotion options. ✔ You can increase your value and earnings potential in cybersecurity easily. ✔ With the right set of cybersecurity skills, recruiters will seek you out ✔ Cybersecurity can provide a real work/life balance.
✔ & more…..
Course Contents
➥ What is Cyber Space?
➥ Exploring the Virtual World
➥ Cyber Space Career Paths
➥ Hacking & Cybersecurity Opportunities
➥ Cyber Expert Roles & Duties
➥ Cybersecurity Job Areas
➥ Internet Basics
➥ How the Internet Works
➥ Internet vs Intranet
➥ Introduction to Networking
➥ Types of Networks
➥ Understanding Network Topology
➥ Essential Network Devices
➥ LAN, MAN & WAN Explained
➥ What is an IP Address?
➥ Types of IP Addresses
➥ IP Addressing and Architecture
➥ What is an Internet Service Provider?
➥ Introduction to Web Servers/ISPs
➥ ISP Architecture & Devices
➥ Information Security Overview
➥ Types of Information
➥ CIA Triad Model
➥ Common Security Threats
➥ What is Hacking?
➥ Understanding Hacking Techniques
➥ 5 Phases of Hacking
➥ Social Engineering Basics & Tools
➥ What is Social Media?
➥ Risks of Social Media
➥ Securing Facebook Access
➥ Securing Instagram Access
➥ Securing WhatsApp Access
➥ Safe Online Banking Practices
➥ Types of Banking Transactions
➥ Steps for Safe Banking Transactions
➥ What is a Web Browser?
➥ Popular Web Browsers
➥ Data Stored by Browsers
➥ How Hackers Steal Data
➥ Securing Your Web Browser
➥ Understanding Browser Extensions
➥ Using & Downloading Extensions
➥ Email Options Overview
➥ Ensuring Email Security
➥ Introduction to Digital Data Security
➥ Preventing Data Cuts, Copies, Pastes
➥ Restricting Pen Drive Access
➥ USB Port Security Measures
➥ Securing USB Drives & Storage
➥ Monitoring Folder Activity
➥ Unrecoverable Data Deletion
➥ Tracking Computer Usage
➥ Advanced Antivirus
➥ Removing Malware, Spyware & Trojans
➥ Comprehensive Computer Security
➥ Windows Security Tips
➥ What is Portable USB PC?
➥ Importance in Digital Security
➥ Creating USB PC with Portable Apps
➥ How USB PC Works
➥ What is Cloud Technology?
➥ Paid vs Free Cloud Services
➥ Cloud-Based File Sharing
➥ Google Drive & Dropbox Overview
➥ Top 10 Cloud Storage Options
➥ What is Linux?
➥ What is Kali Linux?
➥ Introduction to Offensive Security
➥ How to Download Kali Linux?
➥ Kali Linux: The Hacker's OS
➥ Creating Live USB with Kali Linux
➥ Introduction to Virtualization Technology
➥ What are Virtual Machines?
➥ How to Download Virtual Machines?
➥ Installing Virtual Machines on Windows
➥ Installing Kali Linux in VMware/VirtualBox
➥ Setting Up Dual Boot Kali Linux
➥ One-Step Kali Installation in VM
➥ Introduction to Penetration Testing
➥ Why Penetration Testing is Essential
➥ Security Audits vs Vulnerability Assessment vs Pen Testing
➥ Types of Penetration Testing
➥ Real-World Penetration Testing Team Insights
➥ Phases of Penetration Testing
➥ Security Testing Methodology
➥ What is AI?
➥ AI in Everyday Devices
➥ AI for Personal Productivity
➥ Smart Recommendations with AI
➥ AI for Language Translation
➥ AI for Simple Automation
➥ Footprinting Basics
➥ Footprinting Benefits
➥ Footprinting Methodology
➥ Search Engine Footprinting
➥ Google Hacking Techniques
➥ GHDB Database
➥ SearchDiggity Tool
➥ Social Media Footprinting
➥ Website Footprinting
➥ WHO IS Footprinting
➥ DNS Footprinting
➥ Recon-NG Framework
➥ Introduction to Cyber Crime
➥ Types of Cyber Crime
➥ IT Act - 2008 Overview
➥ Cyber Crime Case Studies
➥ Understanding Cyber Law
➥ What is a Server Log?
➥ Role of Nodal/Grievance Officer
➥ What is Email?
➥ How does email works?
➥ Top 5 Email Services (Regular)
➥ Top 5 Corporate Email Services
➥ Threats in Email Security: Malware, ransomware, phishing, business email compromise (BEC)
➥ What is Email Spoofing vs. Phishing vs. Impersonation?
➥ Email Spoofing Techniques
➥ Forensic Techniques for Email Investigation
➥ Find the Root of an Email
➥ What is Email Tracing & Tracking?
➥ Methods of Email Tracking & Tracing
➥ Reporting & Investigation of Emails
➥ The Role of AI in Email Fraud Detection
➥ Top 5 Encrypted Email Services
➥ The Reality of Data Loss
➥ What is Data Loss?
➥ Your Responsibility in Data Security
➥ Common Computer Issues
➥ Causes of Data Loss
➥ Preventing Data Loss
➥ Importance of Data Backup
➥ Backup Hardware Options
➥ Post-Backup Actions
➥ Data Recovery Methods
➥ Data Recovery Tips
➥ Techniques for Data Recovery
➥ Top Data Recovery Software
➥ Data Destruction Methods
➥ Tools for Data Destruction
➥ Understanding Social Media Fraud
➥ What is a Fake Profile?
➥ What is an Imposter Profile?
➥ Types of Social Media Frauds
➥ Detecting Fake Facebook Profiles
➥ Detecting Fake Instagram Profiles
➥ Detecting Fake Profiles on Other Platforms
➥ Tracking & Tracing Fake/Imposter Profiles
➥ Documents Needed from Victims to Reporting
➥ Removing Fake/Imposter Profiles
➥ Writing a Social Media Fraud Report to LEA
➥ Filing a Cyber Cell Complaint
➥ Reporting for Private Investigation
➥ The Role of AI in Social Media Accounts
➥ Overview of Financial Frauds
➥ Understanding ATM Cards
➥ Types of ATM Cards
➥ Offline Banking Overview
➥ Online Banking Overview
➥ Virtual Wallet Explained
➥ Virtual Card Explained
➥ Introduction to UPI
➥ Payment Gateways Overview
➥ Building Your Own Payment Gateway
➥ How Online Frauds Occur?
➥ Investigating Financial Frauds
➥ Documents Needed from Victims to Reporting
➥ Reporting Fraud to Banks
➥ Filing a Cyber Cell Complaint
➥ Reporting Cyber Crime Online
➥ Reporting for Private Investigation
➥ The Role of AI in Banking Fraud
➥ What is a Website?
➥ Website Types and Their Purposes
➥ Understanding Domains
➥ Web Hosting Explained
➥ Different Web Hosting Servers
➥ Top 5 Web Hosting Providers
➥ Role of Databases in Websites
➥ Front-End vs Back-End Development
➥ Database Connectivity with Websites
➥ What is Phishing?
➥ Creating a Phishing Page
➥ Credential Harvesting with Phishing Links
➥ Understanding DoS & DDoS Attacks
➥ Network & Website DoS Attack Methods
➥ Introduction to SQL
➥ Manipulating Databases with SQL
➥ Bypassing Login with SQL Injection
➥ What is SQL Injection?
➥ Types of SQL Injection Attacks
➥ Website Data Dump with SQLmap
➥ The Role of AI in Website Investigation
➥ Introduction to Digital Evidence
➥ Types of Digital Evidence
➥ Digital Evidence Collection
➥ Forensic Imaging Techniques
➥ Chain of Custody in Digital Forensics
➥ Digital Evidence Preservation
➥ Digital Evidence Analysis Tools
➥ Data Recovery Methods
➥ Mobile Device Forensics
➥ Computer Forensics Tools
➥ Email Forensics
➥ Forensic Examination of Social Media
➥ Data Integrity Verification
➥ Forensic Reporting and Documentation
➥ Case Studies in Digital Forensics
➥ Challenges in Digital Evidence Investigation
➥ Emerging Trends in Digital Forensics
➥ The Role of AI in Digital Forensics
➥ Introduction to Cell Tower Technology
➥ How Cell Towers Work
➥ Cell Tower Types and Functions
➥ Understanding CDR (Call Detail Records)
➥ Types of CDR Data
➥ CDR Data Collection & Analysis
➥ Role of CDR in Criminal Investigations
➥ Cell Tower & CDR Data Correlation
➥ Cell Tower Location Tracking
➥ Mobile Number Tracking Using CDR
➥ Forensic Tools for CDR Analysis
➥ Challenges in CDR Forensics in India
➥ Case Studies in CDR Investigation (Indian Context)
➥ Role of Service Providers in CDR Investigations
➥ CDR Analysis for Fraud & Impersonation Detection
➥ Steps for Obtaining CDR Data in India
➥ Forensic Approach to Cell Tower Data and Mobile Hacking