Cyber Awareness Free certificate  Free Certificate

Penetration Testing & Digital Forensics facebook

Certificate in Penetration Testing & Digital Forensics (CPTDF)


 

Duration
7 MONTHS

Fee (INR)
₹ 60,000

As per surveyed by reputed company, On average aprx. 30,000 new website are hacked everyday and attempt cyber attacked on Network.

Penetration testing and Vulnerability scanning and can also test an organizations ability to detect intrusions and breaches. Organizations need to scan the external available infrastructure and applications to protect against external threats.

Since digital devices such as computers are vulnerable to attack by criminals, digital forensics is increasing in importance.


Benefits

Start from 0 up to a high-intermediate level.
Learn ethical hacking, its fields & the different types of hackers.
Understand how websites work, how to discover & exploit web application vulnerabilities to hack websites.
Discover vulnerabilities & exploit them to hack into servers.
Hack secure systems using client-side & social engineering.
Secure systems from all the attacks shown.
Learn Network Hacking / Penetration Testing.
Control Wi-Fi connections without knowing the password.
Greatly Job Culture
You can choose government or private sector work in cybersecurity.
Cybersecurity professionals can choose self-employment.
Specialties in cybersecurity provide plentiful career and promotion options.
You can increase your value and earnings potential in cybersecurity easily.
With the right set of cybersecurity skills, recruiters will seek you out
Cybersecurity can provide a real work/life balance.
& more…..


Course Contents

    • ➥ What is Cyber Space?
    • ➥ Exploring the Virtual World
    • ➥ Cyber Space Career Paths
    • ➥ Hacking & Cybersecurity Opportunities
    • ➥ Cyber Expert Roles & Duties
    • ➥ Cybersecurity Job Areas
    • ➥ Internet Basics
    • ➥ How the Internet Works
    • ➥ Internet vs Intranet
    • ➥ Introduction to Networking
    • ➥ Types of Networks
    • ➥ Understanding Network Topology
    • ➥ Essential Network Devices
    • ➥ LAN, MAN & WAN Explained
    • ➥ What is an IP Address?
    • ➥ Types of IP Addresses
    • ➥ IP Addressing and Architecture
    • ➥ What is an Internet Service Provider?
    • ➥ Introduction to Web Servers/ISPs
    • ➥ ISP Architecture & Devices
    • ➥ Information Security Overview
    • ➥ Types of Information
    • ➥ CIA Triad Model
    • ➥ Common Security Threats
    • ➥ What is Hacking?
    • ➥ Understanding Hacking Techniques
    • ➥ 5 Phases of Hacking
    • ➥ Social Engineering Basics & Tools
    • ➥ What is Social Media?
    • ➥ Risks of Social Media
    • ➥ Securing Facebook Access
    • ➥ Securing Instagram Access
    • ➥ Securing WhatsApp Access
    • ➥ Safe Online Banking Practices
    • ➥ Types of Banking Transactions
    • ➥ Steps for Safe Banking Transactions
    • ➥ What is a Web Browser?
    • ➥ Popular Web Browsers
    • ➥ Data Stored by Browsers
    • ➥ How Hackers Steal Data
    • ➥ Securing Your Web Browser
    • ➥ Understanding Browser Extensions
    • ➥ Using & Downloading Extensions
    • ➥ Email Options Overview
    • ➥ Ensuring Email Security
    • ➥ Introduction to Digital Data Security
    • ➥ Preventing Data Cuts, Copies, Pastes
    • ➥ Restricting Pen Drive Access
    • ➥ USB Port Security Measures
    • ➥ Securing USB Drives & Storage
    • ➥ Monitoring Folder Activity
    • ➥ Unrecoverable Data Deletion
    • ➥ Tracking Computer Usage
    • ➥ Advanced Antivirus
    • ➥ Removing Malware, Spyware & Trojans
    • ➥ Comprehensive Computer Security
    • ➥ Windows Security Tips
    • ➥ What is Portable USB PC?
    • ➥ Importance in Digital Security
    • ➥ Creating USB PC with Portable Apps
    • ➥ How USB PC Works
    • ➥ What is Cloud Technology?
    • ➥ Paid vs Free Cloud Services
    • ➥ Cloud-Based File Sharing
    • ➥ Google Drive & Dropbox Overview
    • ➥ Top 10 Cloud Storage Options
    • ➥ What is Linux?
    • ➥ What is Kali Linux?
    • ➥ Introduction to Offensive Security
    • ➥ How to Download Kali Linux?
    • ➥ Kali Linux: The Hacker's OS
    • ➥ Creating Live USB with Kali Linux
    • ➥ Introduction to Virtualization Technology
    • ➥ What are Virtual Machines?
    • ➥ How to Download Virtual Machines?
    • ➥ Installing Virtual Machines on Windows
    • ➥ Installing Kali Linux in VMware/VirtualBox
    • ➥ Setting Up Dual Boot Kali Linux
    • ➥ One-Step Kali Installation in VM
    • ➥ Introduction to Penetration Testing
    • ➥ Why Penetration Testing is Essential
    • ➥ Security Audits vs Vulnerability Assessment vs Pen Testing
    • ➥ Types of Penetration Testing
    • ➥ Real-World Penetration Testing Team Insights
    • ➥ Phases of Penetration Testing
    • ➥ Security Testing Methodology
    • ➥ What is AI?
    • ➥ AI in Everyday Devices
    • ➥ AI for Personal Productivity
    • ➥ Smart Recommendations with AI
    • ➥ AI for Language Translation
    • ➥ AI for Simple Automation
    • ➥ Footprinting Basics
    • ➥ Footprinting Benefits
    • ➥ Footprinting Methodology
    • ➥ Search Engine Footprinting
    • ➥ Google Hacking Techniques
    • ➥ GHDB Database
    • ➥ SearchDiggity Tool
    • ➥ Social Media Footprinting
    • ➥ Website Footprinting
    • ➥ WHO IS Footprinting
    • ➥ DNS Footprinting
    • ➥ Recon-NG Framework
    • ➥ Introduction to Cyber Crime
    • ➥ Types of Cyber Crime
    • ➥ IT Act - 2008 Overview
    • ➥ Cyber Crime Case Studies
    • ➥ Understanding Cyber Law
    • ➥ What is a Server Log?
    • ➥ Role of Nodal/Grievance Officer
    • ➥ What is Email?
    • ➥ How does email works?
    • ➥ Top 5 Email Services (Regular)
    • ➥ Top 5 Corporate Email Services
    • ➥ Threats in Email Security: Malware, ransomware, phishing, business email compromise (BEC)
    • ➥ What is Email Spoofing vs. Phishing vs. Impersonation?
    • ➥ Email Spoofing Techniques
    • ➥ Forensic Techniques for Email Investigation
    • ➥ Find the Root of an Email
    • ➥ What is Email Tracing & Tracking?
    • ➥ Methods of Email Tracking & Tracing
    • ➥ Reporting & Investigation of Emails
    • ➥ The Role of AI in Email Fraud Detection
    • ➥ Top 5 Encrypted Email Services
    • ➥ The Reality of Data Loss
    • ➥ What is Data Loss?
    • ➥ Your Responsibility in Data Security
    • ➥ Common Computer Issues
    • ➥ Causes of Data Loss
    • ➥ Preventing Data Loss
    • ➥ Importance of Data Backup
    • ➥ Backup Hardware Options
    • ➥ Post-Backup Actions
    • ➥ Data Recovery Methods
    • ➥ Data Recovery Tips
    • ➥ Techniques for Data Recovery
    • ➥ Top Data Recovery Software
    • ➥ Data Destruction Methods
    • ➥ Tools for Data Destruction
    • ➥ Understanding Social Media Fraud
    • ➥ What is a Fake Profile?
    • ➥ What is an Imposter Profile?
    • ➥ Types of Social Media Frauds
    • ➥ Detecting Fake Facebook Profiles
    • ➥ Detecting Fake Instagram Profiles
    • ➥ Detecting Fake Profiles on Other Platforms
    • ➥ Tracking & Tracing Fake/Imposter Profiles
    • ➥ Documents Needed from Victims to Reporting
    • ➥ Removing Fake/Imposter Profiles
    • ➥ Writing a Social Media Fraud Report to LEA
    • ➥ Filing a Cyber Cell Complaint
    • ➥ Reporting for Private Investigation
    • ➥ The Role of AI in Social Media Accounts
    • ➥ Overview of Financial Frauds
    • ➥ Understanding ATM Cards
    • ➥ Types of ATM Cards
    • ➥ Offline Banking Overview
    • ➥ Online Banking Overview
    • ➥ Virtual Wallet Explained
    • ➥ Virtual Card Explained
    • ➥ Introduction to UPI
    • ➥ Payment Gateways Overview
    • ➥ Building Your Own Payment Gateway
    • ➥ How Online Frauds Occur?
    • ➥ Investigating Financial Frauds
    • ➥ Documents Needed from Victims to Reporting
    • ➥ Reporting Fraud to Banks
    • ➥ Filing a Cyber Cell Complaint
    • ➥ Reporting Cyber Crime Online
    • ➥ Reporting for Private Investigation
    • ➥ The Role of AI in Banking Fraud
    • ➥ What is a Website?
    • ➥ Website Types and Their Purposes
    • ➥ Understanding Domains
    • ➥ Web Hosting Explained
    • ➥ Different Web Hosting Servers
    • ➥ Top 5 Web Hosting Providers
    • ➥ Role of Databases in Websites
    • ➥ Front-End vs Back-End Development
    • ➥ Database Connectivity with Websites
    • ➥ What is Phishing?
    • ➥ Creating a Phishing Page
    • ➥ Credential Harvesting with Phishing Links
    • ➥ Understanding DoS & DDoS Attacks
    • ➥ Network & Website DoS Attack Methods
    • ➥ Introduction to SQL
    • ➥ Manipulating Databases with SQL
    • ➥ Bypassing Login with SQL Injection
    • ➥ What is SQL Injection?
    • ➥ Types of SQL Injection Attacks
    • ➥ Website Data Dump with SQLmap
    • ➥ The Role of AI in Website Investigation
    • ➥ Introduction to Digital Evidence
    • ➥ Types of Digital Evidence
    • ➥ Digital Evidence Collection
    • ➥ Forensic Imaging Techniques
    • ➥ Chain of Custody in Digital Forensics
    • ➥ Digital Evidence Preservation
    • ➥ Digital Evidence Analysis Tools
    • ➥ Data Recovery Methods
    • ➥ Mobile Device Forensics
    • ➥ Computer Forensics Tools
    • ➥ Email Forensics
    • ➥ Forensic Examination of Social Media
    • ➥ Data Integrity Verification
    • ➥ Forensic Reporting and Documentation
    • ➥ Case Studies in Digital Forensics
    • ➥ Challenges in Digital Evidence Investigation
    • ➥ Emerging Trends in Digital Forensics
    • ➥ The Role of AI in Digital Forensics
    • ➥ Introduction to Cell Tower Technology
    • ➥ How Cell Towers Work
    • ➥ Cell Tower Types and Functions
    • ➥ Understanding CDR (Call Detail Records)
    • ➥ Types of CDR Data
    • ➥ CDR Data Collection & Analysis
    • ➥ Role of CDR in Criminal Investigations
    • ➥ Cell Tower & CDR Data Correlation
    • ➥ Cell Tower Location Tracking
    • ➥ Mobile Number Tracking Using CDR
    • ➥ Forensic Tools for CDR Analysis
    • ➥ Challenges in CDR Forensics in India
    • ➥ Case Studies in CDR Investigation (Indian Context)
    • ➥ Role of Service Providers in CDR Investigations
    • ➥ CDR Analysis for Fraud & Impersonation Detection
    • ➥ Steps for Obtaining CDR Data in India
    • ➥ Forensic Approach to Cell Tower Data and Mobile Hacking
    • ➥ The Role of AI in CDR Investigation
    • ➥ Virtual Number Applications
    • ➥ Mobile Number Hacking Techniques
    • ➥ Mobile Number Spoofing Methods
    • ➥ Identifying Spoofed Calls & Messages
    • ➥ Tools for Mobile Number Spoofing
    • ➥ SIM Swap Fraud & Prevention
    • ➥ Virus, Trojan & Keylogger Overview
    • ➥ Types of Viruses, Trojans & Keyloggers
    • ➥ Behavior of Viruses, Trojans & Keyloggers
    • ➥ Detection of Viruses, Trojans & Keyloggers
    • ➥ Forensic Analysis of Infections
    • ➥ Tracking Virus, Trojan & Keylogger Origins
    • ➥ Keylogger, Trojan & Virus Removal
    • ➥ Preventing Malware Attacks (Virus, Trojan, Keylogger)
    • ➥ Incidence Management
    • ➥ Benefits of Incidence Management
    • ➥ The Incidence Management Process
    • ➥ Best Practice For Implementing Management
    • ➥ Importance Of Security Policy
    • ➥ Acceptable Encryption Policy
    • ➥ Acceptable Use Policy
    • ➥ Clean Desk Policy
    • ➥ Data Breach Response Policy
    • ➥ Disaster Recovery Plan Policy 58
    • ➥ Digital Signature Acceptance Policy
    • ➥ Email Policy
    • ➥ Ethics Policy
    • ➥ Pandemic Response Planning Policy
    • ➥ Password Construction Guideline
    • ➥ Password Protection Policy
    • ➥ Security Response Plan Policy
    • ➥ End Users Encryption Key protection Policy
    • ➥ Acquisition Assessment Policy
    • ➥ Bluetooth Baseline Requirements Policy
    • ➥ Remote Access Police
    • ➥ Remote Access Tools Policy
    • ➥ Router And Switch Security Policy
    • ➥ Wireless Communication Policy
    • ➥ Wireless Communication Standard
    • ➥ Database Credentials Policy
    • ➥ Technology Equipment Disposal Policy
    • ➥ Information Logging Standard
    • ➥ Lab Security Policy
    • ➥ Server Security Policy
    • ➥ Software Installation Policy
    • ➥ Workstation Security Policy
    • ➥ Application Security
    • ➥ Web Application Security Policy
    • ➥ The Role of AI in Policy Designing
    • ➥ Introduction to Network Scanning and Penetration Testing
    • ➥ Understanding Networking Basics (IP, Subnetting, Ports, Protocols)
    • ➥ Tools and Techniques for Network Scanning
    • ➥ Manual Network Scanning Using Windows
    • ➥ Network Scanning on Android Devices
    • ➥ Basic Vulnerability Scanning Tools for Windows
    • ➥ Advanced Network Scanning Techniques
    • ➥ Shodan for Mapping the Internet
    • ➥ Advanced Pentesting with Kali Linux
    • ➥ Automated Scanning and Vulnerability Assessment
    • ➥ Advanced Scanning and Enumeration on Android
    • ➥ The Role of AI in Network Pentesting
    • ➥ Proxy Preparation
    • ➥ Proxy Chaining
    • ➥ Proxy Tools
    • ➥ Proxy and VPN
    • ➥ IP Spoofing
    • ➥ IP Spoofing Detection - IP Identification Number
    • ➥ IP Spoofing Countermeasures
    • ➥ MAC Spoofing - SMAC
    • ➥ Defending Against MAC Spoofing
    • ➥ What is Sniffing?
    • ➥ Types of Sniffing
    • ➥ Sniffing Tools Overview
    • ➥ Introduction to TCP Three-Way Handshake
    • ➥ Detailed Steps of the Three-Way Handshake
    • ➥ Role of SYN, SYN-ACK, and ACK in TCP
    • ➥ Introduction to the OSI Model
    • ➥ Introduction to Wireshark
    • ➥ Wireshark Installation and Setup
    • ➥ Wireshark User Interface Overview
    • ➥ Capturing Network Traffic with Wireshark
    • ➥ Analyzing Packets in Wireshark
    • ➥ Understanding Protocols in Wireshark
    • ➥ Wireshark Filters and Search Techniques
    • ➥ Advanced Wireshark Features
    • ➥ Wireshark for Network Troubleshooting
    • ➥ Wireshark Security Considerations and Best Practices
    • ➥ OS and BIOS Password Recovery
    • ➥ Windows and Linux Password Reset
    • ➥ Password Dumping and Recovery Tools (e.g., Passcap)
    • ➥ Application Password Cracking Techniques
    • ➥ Wi-Fi Password Recovery
    • ➥ Creating Strong and Unbreakable Passwords
    • ➥ Advanced Scripting in Kali Linux
    • ➥ Hydra for Advanced Password Cracking
    • ➥ Location Tracking Scripts
    • ➥ Web Application Exploitation Scripts
    • ➥ Network Exploitation Scripts
    • ➥ Social Engineering Toolkit (SET)
    • ➥ Advanced Network Sniffing and MITM Attacks
    • ➥ What is Metasploit?
    • ➥ Setting Up and Running Metasploit
    • ➥ Metasploit Basic Commands and Usage
    • ➥ Metasploit Exploit Basics
    • ➥ Post-Exploitation with Metasploit
    • ➥ Advanced Penetration Testing with Metasploit
    • ➥ Metasploit Payloads Overview
    • ➥ Creating Custom Payloads and Exploits
    • ➥ Metasploit Auxiliary Modules
    • ➥ Advanced Post-Exploitation
    • ➥ Metasploit Automation with Autopwn
    • ➥ Vulnerability Assessment
    • ➥ Types of Vulnerability Assessment
    • ➥ Vulnerability Research
    • ➥ Web Server Attacks
    • ➥ Website Attacks Methodology
    • ➥ Website Information Gathering
    • ➥ Web Server Footprinting
    • ➥ Mirroring a Website
    • ➥ Vulnerability Scanning
    • ➥ Web Server Security Scanner: Acunetix Scanner
    • ➥ What Exactly Is a Bug Bounty?
    • ➥ How Do Bug Bounties Work?
    • ➥ How Does a Bug Bounty Program Work?
    • ➥ How to Get Started with Bug Bounty?
    • ➥ Bug Bounty Program Examples
    • ➥ Getting started with Burp Suite
    • ➥ Intercepting HTTP traffic with Burp Proxy
    • ➥ Setup Manual Proxy in Browser
    • ➥ Setup Manual Proxy with Add-on in Browser
    • ➥ Parameter/ Form Temporising
    • ➥ Modifying HTTP requests with Burp Proxy
    • ➥ Reissue requests with Burp Repeater
    • ➥ Testing different input with Burp Repeater
    • ➥ Run your first scan with Burp Scanner
    • ➥ Getting started with Burp Intruder
    • ➥ DVWA Introduction
    • ➥ How to install DVWA on Windows
    • ➥ How to use the Damn Vulnerable Web Application?
    • ➥ Brute Force
    • ➥ Command Injection
    • ➥ Cross Site Request Forgery Attacks (CSRF)
    • ➥ ClickJacking Attack
    • ➥ SPF-DKIM-DMARC Records
    • ➥ EXIF Data
    • ➥ No Rate Limit Bypass
    • ➥ Bug Bounty Hunter - Account Creation
    • ➥ Open Redirection
    • ➥ Cross Site Scripting Attacks (XSS) & Types
    • ➥ Access control vulnerabilities-Session Hijacking & privilege escalation
    • ➥ Indirect Object Reference (IDOR)
    • ➥ Invalidate session after password reset
    • ➥ File upload Vulnerability
    • ➥ Directory Traversal
    • ➥ WordPress Security Scanner-Wpscan
    • ➥ Local File Inclusion & Remote file Inclusion
    • ➥ The Role of AI in Network Pentesting
    • ➥ Cloud Computing
    • ➥ Types Of Cloud Computing Services
    • ➥ SaaS (Software as a Service)
    • ➥ LaaS (Infrastructure as a Service)
    • ➥ PaaS (Platform as a Service)
    • ➥ NaaS ( Network as a Service)
    • ➥ XaaS (Anything as a Service)
    • ➥ Social Engineering Toolkit
    • ➥ Wireless Concept
    • ➥ Wireless technologies
    • ➥ Service Set Identifier (SSID)
    • ➥ WiFi Authentication Modes
    • ➥ WiFi Chalking
    • ➥ Wireless Antenna
    • ➥ Wireless Encryption
    • ➥ WEP Encryption
    • ➥ WPA Encryption
    • ➥ WPA2 Encryption
    • ➥ Wireless Hacking Methodology
    • ➥ WiFi Discovery
    • ➥ GPS Mapping
    • ➥ Wireless Traffic Analysis
    • ➥ Launch Wireless Attack
    • ➥ Crack Wireless Encryption
    • ➥ WiFi Jammer / Signal Blocking
    • ➥ Rouge Access Point
    • ➥ Fluxion / AirGeddon WiFi Attack
    • ➥ Secure WiFi Router
    • ➥ Overview of Smartphone Security
    • ➥ Mobile Operating Systems (Android, iOS)
    • ➥ Common Mobile Threats and Vulnerabilities
    • ➥ Mobile Malware and Trojans
    • ➥ Mobile Device Management (MDM)
    • ➥ Mobile App Security
    • ➥ Bypassing Smartphone Security
    • ➥ Mobile Encryption and Data Protection
    • ➥ Smartphone Forensics
    • ➥ Introduction to Spy Applications
    • ➥ Types of Spy Apps for Smartphones
    • ➥ Installing Spy Apps on Mobile Devices
    • ➥ Configuring Spy Apps on Android/iOS
    • ➥ Features of Spy Apps (Call Logs, Messages, GPS Tracking, etc.)
    • ➥ Accessing Data Collected by Spy Apps
    • ➥ Legal and Ethical Aspects of Using Spy Apps
    • ➥ Stealth Mode in Spy Apps
    • ➥ Remote Control and Monitoring Features
    • ➥ Detecting Spy Apps on Your Phone
    • ➥ Securing Your Smartphone Against Spyware
    • ➥ Installation and Configuration of Firewalls
    • ➥ Employee System Monitoring Tools
    • ➥ Call Monitoring Systems for Telecallers
    • ➥ Endpoint Security Solutions
    • ➥ Report Tracking and Management Systems


Eligibility

12th or Equivalent.

For Whom?

Student
IT Professional
Security Analyst
Network Engineer
Other Professional
Police
Lawyer
IT Expert
Forensic Expert
Judges

Career Opportunities

Consulting for Cyber Security
Consulting for Vulnerability Scanning
Cyber Expert
Penetration Test Engineer
Digital Forensics Expert

Student Kit

  Book
  Printable Digital Copy Material
  Necessary Tool (Academic Version)
  Course Certificate