Expert Advice Logo  Expert Advice

Cyber Course facebook

Cyber Course


  • Course Content

    1. 1. Internet Process
      • 1.1 Introduction Of Internet
      • 1.2 How Does Internet Works
      • 1.3 Network Introduction
      • 1.4 IP Address and Architecture
      • 1.5 Introduction of Web Server/ISP
      • 1.6 Devices Used in ISP Architecture
    2. 2. Exploring Ethical Hacking
      • 2.1 Information Security
      • 2.2 Hacking Explained
      • 2.3 5 Phases For Hackers & Investigator
      • 2.4 Social Engineering
      • 2.5 Social Engineering Techniques
      • 2.6 Need Of Ethical Hacker
    3. 3. Kali Linux : The Ultimate Weapon
      • 3.1 Kali Linux : OS for Hackers
      • 3.2 How To Install Kali Linux in VMware
      • 3.3 Installing Dual Boot Kali Linux
      • 3.4 Live USB of Kali Linux
    4. 4. Introduction to Penetration Testing
      • 4.1 Introduction Of Penetration Testing
      • 4.2 Need Of Penetration Testing
      • 4.3 Security Audits Vs Vulnerability Assessment Vs Pen Test
      • 4.4 Types Of Penetration Testing
      • 4.5 Phases Of Penetration Testing
      • 4.6 Security Testing Methodology
    5. 5. Google Dork : Information Gathering & Footprinting
      • 5.1 Footprinting Concept
      • 5.2 Benefits Of Footprinting
      • 5.3 Footprinting Methodology
      • 5.4 Footprinting Through Search Engine
      • 5.5 Footprinting Using Advanced Google Hacking Techniques
      • 5.6 GHDB Database
      • 5.7 Search Diggity Tool
      • 5.8 Footprinting Through Social Networking Websites
      • 5.9 Website Footprinting
      • 5.10  WHOIS Foot printing
      • 5.11 DNS Footprinting
      • 5.12 Recon-NG
    1. 6. Browser & Email Security
      • 6.1 Browser Security
      • 6.2 Email Option
      • 6.3 Email Security
    2. 7. Social Media & Banking Security
      • 7.1 Secure Access Of Facebook
      • 7.2 Secure Use of Twitter
      • 7.3 Banking Transaction
      • 7.4 Secure And Safe Banking Transaction
    3. 8. Digital Data Security
      • 8.1 Introduction to Digital Data & Security
      • 8.2 Prevent Cut, Copy And Paste
      • 8.3 Restrict Pen Drive To Computer
      • 8.4 USB Port Security
      • 8.5 Udrive & Storage Devices Security
      • 8.6 Monitoring Folder Activity
      • 8.7 Unrecoverable Delete
      • 8.8 Tracking Computer Activity
      • 8.9 Virus Protected Computer With Antivirus
      • 8.1 Remove Malware, Spyware, Rootkit , Backdoor, Trojan From PC
      • 8.11 Computer Security
      • 8.12 Window Tips
    4. 9. Cloud Technology
      • 9.1 File Sharing Using Cloud System
      • 9.2 Google Drive & Dropbox.Com
      • 9.3 Funny Tricks Using Regedit


  • Course Content

    1. 1.Cyber Security Introduction
      • 1.1 Type of Cyber Security
      • 1.2 Real Vs Virtual World
      • 1.3 Cyber Fraud
    2. 2. Internet Process
      • 2.1 Introduction Of Internet
      • 2.2 How Does Internet Works
      • 2.3 Network Introduction
      • 2.4 IP Address and Architecture
      • 2.5 Introduction of Web Server/ISP
      • 2.6 Devices Used in ISP Architecture
    3. 3. Exploring Ethical Hacking
      • 3.1 Information Security
      • 3.2 Hacking Explained
      • 3.3 5 Phases For Hackers & Investigator
      • 3.4 Social Engineering
      • 3.5 Social Engineering Techniques
      • 3.6 Need Of Ethical Hacker
    4. 4. Kali Linux : The Ultimate Weapon
      • 4.1 Kali Linux : OS for Hackers
      • 4.2 How To Install Kali Linux in VMware
      • 4.3 Installing Dual Boot Kali Linux
      • 4.4 Live USB of Kali Linux
    5. 5. Desktop Security
      • 5.1 Cut/Copy/Paste Prevention
      • 5.2 Protect PC from anonymous USB Storage
      • 5.3 Technique for Generate Secret Key
      • 5.4 Audit anonymous access of confidential File
      • 5.5 Increase System Performance without HW/SW
      • 5.6 Track file/Folder access
      • 5.7 Add application into Right Click Menu
      • 5.8 Hide Important Drive
      • 5.9 Restore Data in case of Crash Computer
      • 5.10 Customize Default Screen Sever
      • 5.11 Enable or Disable Task Manager
    1. 6. Email Security
      • 6.1 Secure Password even password theft
      • 6.2 Monitor Chrome Activity though email
      • 6.3 Monitor Mobile Activity
      • 6.4 Audit delete activity
    2. 7. Messaging App Privacy
      • 7.1 Application Lock
      • 7.2 Hide Messaging applications
      • 7.3 Encrypt Data
      • 7.4 Save Data while Mobile Number Change/Device
      • 7.5 Protect from Download/Save sent Images
      • 7.6 Auto Deleted Confidential sent Message
      • 7.7 Undo Deleted Message
      • 7.8 Hide Identity in Whatsapp
    3. 8. Website Attack
      • 8.1 Phishing
      • 8.2 Email Bombing
      • 8.3 SQL Injection-havij
      • 8.4 DDos
    4. 9. Cyber law
      • 9.1 Types Of Cyber Crime
      • 9.2 ITAct - 2008
    5. 10. Current Tools & Technology


  • Course Content

    1. 1. Internet Process
      • 1.1 Introduction Of Internet
      • 1.2 How Does Internet Works
      • 1.3 Network Introduction
      • 1.4 IP Address and Architecture
      • 1.5 Introduction of Web Server/ISP
      • 1.6 Devices Used in ISP Architecture
    2. 2. Exploring Ethical Hacking
      • 2.1 Information Security
      • 2.2 Hacking Explained
      • 2.3 5 Phases For Hackers & Investigator
      • 2.4 Social Engineering
      • 2.5 Social Engineering Techniques
      • 2.6 Need Of Ethical Hacker
    3. 3. Kali Linux : The Ultimate Weapon
      • 3.1 Kali Linux : OS for Hackers
      • 3.2 How To Install Kali Linux in VMware
      • 3.3 Installing Dual Boot Kali Linux
      • 3.4 Live USB of Kali Linux
    4. 4. Introduction to Penetration Testing
      • 4.1 Introduction Of Penetration Testing
      • 4.2 Need Of Penetration Testing
      • 4.3 Security Audits Vs Vulnerability Assessment Vs Pen Test
      • 4.4 Types Of Penetration Testing
      • 4.5 Phases Of Penetration Testing
      • 4.6 Security Testing Methodology
    5. 5. Google Dork : Information Gathering & Footprinting
      • 5.1 Footprinting Concept
      • 5.2 Benefits Of Footprinting
      • 5.3 Footprinting Methodology
      • 5.4 Footprinting Through Search Engine
      • 5.5 Footprinting Using Advanced Google Hacking Techniques
      • 5.6 GHDB Database
      • 5.7 Search Diggity Tool
      • 5.8 Footprinting Through Social Networking Websites
      • 5.9 Website Footprinting
      • 5.10  WHOIS Foot printing
      • 5.11 DNS Footprinting
      • 5.12 Recon-NG
    6. 6. Browser & Email Security
      • 6.1 Browser Security
      • 6.2 Email Option
      • 6.3 Email Security
    7. 7. Social Media & Banking Security
      • 7.1 Secure Access Of Facebook
      • 7.2 Secure Use of Twitter
      • 7.3 Banking Transaction
      • 7.4 Secure And Safe Banking Transaction
    8. 8. Digital Data Security
      • 8.1 Introduction to Digital Data & Security
      • 8.2 Prevent Cut, Copy And Paste
      • 8.3 Restrict Pen Drive To Computer
      • 8.4 USB Port Security
      • 8.5 Udrive & Storage Devices Security
      • 8.6 Monitoring Folder Activity
      • 8.7 Unrecoverable Delete
      • 8.8 Tracking Computer Activity
      • 8.9 Virus Protected Computer With Antivirus
      • 8.10 Remove Malware, Spyware, Rootkit , Backdoor, Trojan From PC
      • 8.11 Computer Security
      • 8.12 Window Tips
    9. 9. Cloud Technology
      • 9.1 File Sharing Using Cloud System
      • 9.2 Google Drive & Dropbox.Com
      • 9.3 Funny Tricks Using Regedit
    10. 10. Introduction to Cyber Crime Investigation
      • 10.1 Cyber Crime Introduction
      • 10.2 Types of Cyber Crime
      • 10.3 Cyber Law
      • 10.4 Server Log
    11. 11. Email Frauds Investigation
      • 11.1 Email Tracing And Tracking
      • 11.2 Root Of Email
      • 11.3 Email Spoofing
      • 11.4 Proton Mail : Encrypted Email Service
      • 11.5 Morphing Detection
    12. 12. Data Recovery and Digital Data Analysis
      • 12.1 Data Recovery
      • 12.2 Data Destroy
    13. 13. Social Media Profile Investigation
      • 13.1 Cyber Fraud Detection
      • 13.2 Fake Facebook Profile Detection
      • 13.3 Fake Instagram Profile Detection
    14. 14. Banking and ATM Fraud Investigation
      • 14.1 ATM Card Fraud Investigation
      • 14.2 Virtual Wallet & Security
      • 14.3 Virtual Card & Security
    15. 15. Website Hacking & Investigation
      • 15.1 Basics Of Website Hacking
      • 15.2 DoS/DDoS Attack Tool
      • 15.3 Website Phishing
    16. 16. Computer & Digital Forensics
      • 16.1 Digital Forensic
      • 16.2 What Is Forensic?
      • 16.3 Why Does Forensic Require?
      • 16.4 Computer Forensic Using Winhex
      • 16.5 MD5, SHA1, SHA256 Hash Techniques
      • 16.6 Image Cloning
      • 16.7 Types of Cryptography/Steganography
      • 16.8 Tools for Cryptography/Steganography
      • 16.9 Nirlauncher Utilities
      • 16.10 Network Forensic
      • 16.11 Registry Forensic
      • 16.12 Browser Forensic
      • 16.13 ID Search : Data Indexing
    17. 17. Cell Tower Technology and Mobile Number Hacking
      • 17.1 Trace Spoof Mobile Call
      • 17.2 Cell Towers and Mobile Networks
      • 17.3 Mobile Number Hacking
    18. 18. Virus and Ransomware Investigation
      • 18.1 Introduction to Malware
      • 18.2 Malware Example
      • 18.3 Malware Propagation
      • 18.4 Trojan Concept
      • 18.5 Use of Trojan by hacker
      • 18.6 Infecting Systems through Trojan
      • 18.7 Deploying Trojan
      • 18.8 Virus And warm
      • 18.9 Stage of Virus Life
      • 18.10 Working With Viruses
      • 18.11 Ransomware
      • 18.12 Types Of Virus
      • 18.13 Computer Warms
      • 18.14 Malware Reverse Engineering
      • 18.15 Malware analysis Procedure
      • 18.16 Malware Detection
      • 18.17 Detecting Trojans
      • 18.18 Detecting Viruses
      • 18.19 Introduction to Keyloggers/RATS
      • 18.20 Types of Keyloggers/RATS
    19. 19. Security Polices and Incidence Management
      • 19.1 Incidence Management
      • 19.2 Benefits of Incidence Management
      • 19.3 The Incidence Management Process
      • 19.4 Best Practice For Implementing Management
      • 19.5 Importance Of Security Policy
      • 19.6 Acceptable Encryption Policy
      • 19.7 Acceptable Use Policy
      • 19.8 Clean Desk Policy
      • 19.9 Data Breach Response Policy
      • 19.10 Disaster Recovery Plan Policy 58
      • 19.11 Digital Signature Acceptance Policy
      • 19.12 Email Policy
      • 19.13 Ethics Policy
      • 19.14 Pandemic Response Planning Policy
      • 19.15 Password Construction Guideline
      • 19.16 Password Protection Policy
      • 19.17 Security Response Plan Policy
      • 19.18 End Users Encryption Key protection Policy
      • 19.19 Acquisition Assessment Policy
      • 19.20 Bluetooth Baseline Requirements Policy
      • 19.21 Remote Access Police
      • 19.22 Remote Access Tools Policy
      • 19.23 Router And Switch Security Policy
      • 19.24 Wireless Communication Policy
      • 19.25 Wireless Communication Standard
      • 19.26 Database Credentials Policy
      • 19.27 Technology Equipment Disposal Policy
      • 19.28 Information Logging Standard
      • 19.29 Lab Security Policy
      • 19.30 Server Security Policy
      • 19.31 Software Installation Policy
      • 19.32 Workstation Security Policy
      • 19.33 Application Security
      • 19.34 Web Application Security Policy
    1. 20. Network Hacking & Security
      • 20.1 network Footprinting
      • 20.2 Network Scanning
      • 20.3 Network Mapping
      • 20.4 TCP Communication
      • 20.5 Creating Custom Data Packets Using TCP Flags
      • 20.6 Live System Scanning
      • 20.7 Port Scanning
      • 20.8 Scanning Beyond IDS
      • 20.9 Banner Grabbing
      • 20.10 Tech of Enumeration
      • 20.11 Netbios Enumeration
      • 20.12 Netbios Enumeration Tool: Superscan
      • 20.13 Tool: Net BIOS Enumeration
      • 20.14 NBT State, Super Scan
      • 20.15 ID Server, Nmap, NetCat, Net Craft, CURL
      • 20.16 NET Penetration Testing Using Android
    2. 21. IP, MAC & Proxy Hacking & Security
      • 21.1 Proxy Preparing
      • 21.2 Proxy Chaining
      • 21.3 Proxy Tools
      • 21.4 Proxy & VPN
      • 21.5 Ip Spoofing
      • 21.6 Ip Spoofing Detection-Ip Identification Number
      • 21.7 Ip Spoofing Detection-Direct TTL Probes
      • 21.8 Ip Spoofing Counter Measures
      • 21.9 Scanning Pen Testing
      • 21.10 MAC Spoofing-SMAC
      • 21.11 Defend Against MAC Spoofing
    3. 22. Sniffing Techniques & Security
      • 22.1 What Is Sniffer
      • 22.2 Types of Sniffer:Passive Sniffer/Active Sniffer
      • 22.3 Sniffer: Wireshark CACE Pilot
      • 22.4 Password Sniffer: ACE
      • 22.5 Employee Tracking Active Track
      • 22.6 Packet Sniffer Capsa Network
      • 22.7 Sniffing Prevention/ Detection Technique
    4. 23. Offline Password Hacking & Security
      • 23.1 OS, BIOS Password
      • 23.2 Recovery (Windows, Linux)
      • 23.3 Password Recovery And Dumping (Passcap)
      • 23.4 Application Password Cracking
      • 23.5 Wifi- Password Recovery
      • 23.6 Strong And Unbreakable Password
    5. 24. Metasploit : Payloads Godfather
      • 24.1 Metasploit Basic Command Tutorial
      • 24.2 Metasploit Desktop Exploit
      • 24.3 Advanced Penetration Using Metasploit
      • 24.4 Integrated Nessus With MT And Kali Linux
      • 24.5 Autopwn Metasploit
    6. 25. Vulnerability Assessment and Pentesting
      • 25.1 Vulnerability Assessment
      • 25.2 Type of Vulnerability Assessment
      • 25.3 Vulnerability Research
      • 25.4 Web Server Attacks
      • 25.5 Website Attacks Methodology
      • 25.6 Website Information Gathering
      • 25.7 Web Server Footprinting
      • 25.8 Mirroring a Website
      • 25.9 Vulnerability Scanning
      • 25.10 Web Server Security Scanner: Acunetix Scanner
      • 25.11 Burp Suites Professional - Vulnerability Scanner
      • 25.12 Session Hijacking
      • 25.13 Hacking Web Passwords
      • 25.14 Web Application Hacking
      • 25.15 Web Application Threats
      • 25.16 Invalidated Input
      • 25.17 Parameter/ Form Temporizing
      • 25.18 Directory Traversal
      • 25.19 Security Misconfiguration
      • 25.20 Cross Site Scripting Attacks (XSS)
      • 25.21 Cross Site Request Forgery Attacks (CSRF)
      • 25.22 Denial of Service Attacks in Web Application
      • 25.23 Web Application Hacking Tools
      • 25.24 SQL Injection Concept
      • 25.25 Types of SQL Injection
      • 25.26 Error Base SQL Injection
      • 25.27 Blind SQL Injection
      • 25.28 SQL Injection Tools (Desktop & Mobiles)
      • 25.29 Wordpress Security Scanner-Wpscan
    7. 26. Cloud Computing & Infrastructure
      • 26.1 Cloud Computing
      • 26.2 Types Of Cloud Computing Services
      • 26.3 SaaS (Software as a Service)
      • 26.4 LaaS (Infrastructure as a Service)
      • 26.5 PaaS (Platform as a Service)
      • 26.6 NaaS ( Network as a Service)
      • 26.7 XaaS (Anything as a Service)
    8. 27. Wi-Fi Hacking & Security
      • 27.1 Social Engineering Toolkit
      • 27.2 Wireless Concept
      • 27.3 Wireless technologies
      • 27.4 Service Set Identifier (SSID)
      • 27.5 WiFi Authentication Modes
      • 27.6 WiFi Chalking
      • 27.7 Wireless Antenna
      • 27.8 Wireless Encryption
      • 27.9 WEP Encryption
      • 27.10 WPA Encryption
      • 27.11 WPA2 Encryption
      • 27.12 Wireless Hacking Methodology
      • 27.13 WiFi Discovery
      • 27.14 GPS Mapping
      • 27.15 Wireless Traffic Analysis
      • 27.16 Launch Wireless Attack
      • 27.17 Crack Wireless Encryption
      • 27.18 WiFi Jammer / Signal Blocking
      • 27.19 Rouge Access Point
      • 27.20 Fluxion / AirGeddon WiFi Attack
      • 27.21 Secure WiFi Router
    9. 28. Smart Phone Hacking & Security
      • 28.1 Security For Smart phones
      • 28.2 Anti Virus for Android
      • 28.3 Android phones Rooting
      • 28.4 Mobile Spy-Android/Iphone
      • 28.5 Droid Jack-Remote Phone Hack
      • 28.6 Application For Rooted And Android Phone
      • 28.7 Networking Hacking Using Mobile Phone (Android)
      • 28.8 Penetration Testing in Root Word
      • 28.9 Latest Tools & Techniques


  • Course Content

    1. 1. Digital Marketing Fundamentals
      • 1.1 What is Digital Marketing
      • 1.2 Inbound v/s Outbound Marketing
      • 1.3 Content Marketing
      • 1.4 Understanding Visitors
      • 1.5 Understanding Leads
    2. 2. Website Planning and Structure
      • 2.1 Introduction www
      • 2.2 Domains
      • 2.3 Buying a Domain
      • 2.4 Website Language & Technology
      • 2.5 One Page Website
    3. 3. Search Engine Optimization
      • 3.1 Increase Rank in Search Engine
      • 3.2 Meta Data Analysis
      • 3.3 Back-link Generator
      • 3.4 Unique Keywords & Description
      • 3.5 Website Auditing
      • 3.6 Designing Word-press Website
      • 3.7 Competitor Monitoring Tools & Techniques
    4. 4. Facebook Market Fundamental
      • 4.1 Create Profiles and Pages
      • 4.2 Increase Likes/Followers
      • 4.3 Scheduling Posts
      • 4.4 Publish/Manage Events
      • 4.5 Pro Response
      • 4.6 Audience Insights
      • 4.7 Competitors Facebook Page
    5. 5. Facebook Ad Campaigns
      • 5.1 Organic v/s Paid
      • 5.2 Defining Ad Objective
      • 5.3 Ad Components
      • 5.4 Designing Creative Image
      • 5.5 Setting Up Facebook Ad Account
      • 5.6 Create Ads Targeting, Budgeting, Creative
      • 5.7 Boosting Page Posts
      • 5.8 Page Promotion
      • 5.9 Video Promotion
      • 5.10 Check Similar Ads and Audience
      • 5.11 Re marketing Website Visitors
      • 5.12 Managing and Editing Ads
      • 5.13 Ad Reports and Ad Insights
      • 5.14 Billing and Account
    6. 6. Google Adwords Basics
      • 6.1 Understanding Adwords
      • 6.2 Google Ad Types
      • 6.3 Pricing Models
      • 6.4 Ad Page Rank
      • 6.5 Adwords User Interface
      • 6.6 Creating Ad Campaigns
    1. 7. Google Adwords Intermediate
      • 7.1 Pay-per-Click, Cost-per-Action
      • 7.2 Bidding Strategy on Location, Schedule, Devices
      • 7.3 Designing Image/video Ads
    2. 8. Google Plus for Business
      • 8.1 Google Plus Profile
      • 8.2 Google Local Business
      • 8.3 Google + Company Page
      • 8.4 Managing Circles
      • 8.5 Posting Contents
      • 8.6 Sharing G+ Buttons on Website
      • 8.7 HashTags & Mentions
    3. 9. Youtube Marketing Fundamentals
      • 9.1 Google Pages for Youtube Channel
      • 9.2 Verify Channel
      • 9.3 Webmaster tool - Adding Asset
      • 9.4 Associated Website Linking
      • 9.5 Custom Channel URL & Keywords
      • 9.6 Branding Watermark
      • 9.7 Uploading Video
      • 9.8 Live Broadcasting
      • 9.9 Managing Comments & Messages
      • 9.10 Monetization with Adsense
      • 9.11 Paid Youtube Channel
      • 9.12 Channel Analytics
      • 9.13 Real Time Analytics
    4. 10. Email Marketing and Content Writing
      • 10.1 Importing Email Lists
      • 10.2 Email Templates & Designs
      • 10.3 Sending HTML Email Campaigns
      • 10.4 Campaign Reports & Insights
      • 10.5 Auto-Responder Actions
    5. 11. Marketing Automation
      • 11.1 Marketing Automation Tools
      • 11.2 Email Auto-responder
      • 11.3 SMS Auto-responder
      • 11.4 Lead Generation Strategy
      • 11.5 Capturing Leads from Sources
      • 11.6 Lead & List Management
      • 11.7 Business Reporting

  • Course Content

    1. 1. Introduction to Cyber Crime Investigation
      • 1.1 Cyber Crime Introduction
      • 1.2 Types of Cyber Crime
      • 1.3 Cyber Law
      • 1.4 Server Log
    2. 2. Email Frauds Investigation
      • 2.1 Email Tracing And Tracking
      • 2.2 Root Of Email
      • 2.3 Email Spoofing
      • 2.4 Proton Mail : Encrypted Email Service
      • 2.5 Morphing Detection
    3. 3. Data Recovery and Digital Data Analysis
      • 3.1 Data Recovery
      • 3.2 Data Destroy
    4. 4. Social Media Profile Investigation
      • 4.1 Cyber Fraud Detection
      • 4.2 Fake Facebook Profile Detection
      • 4.3 Fake Instagram Profile Detection
    5. 5. Banking and ATM Fraud Investigation
      • 5.1 ATM Card Fraud Investigation
      • 5.2 Virtual Wallet & Security
      • 5.3 Virtual Card & Security
    6. 6. Website Hacking & Investigation
      • 6.1 Basics Of Website Hacking
      • 6.2 DoS/DDoS Attack Tool
      • 6.3 Website Phishing
    7. 7. Computer & Digital Forensics
      • 7.1 Digital Forensic
      • 7.2 What Is Forensic?
      • 7.3 Why Does Forensic Require?
      • 7.4 Live System Footprinting : WinLift
      • 7.5 MD5, SHA1, SHA256 Hash Techniques
      • 7.6 Image Cloning
      • 7.7 Types of Cryptography/Steganography
      • 7.8 Tools for Cryptography/Steganography
      • 7.9 Nirlauncher Utilities
      • 7.10 Network Forensic
      • 7.11 Registry Forensic
      • 7.12 Browser Forensic
      • 7.13 ID Search : Data Indexing
    8. 8. Cell Tower Technology and Mobile Number Hacking
      • 8.1 Trace Spoof Mobile Call
      • 8.2 Cell Towers and Mobile Networks
      • 8.3 Mobile Number Hacking
    9. 9. Virus and Ransomware Investigation
      • 9.1 Introduction to Malware
      • 9.2 Malware Example
      • 9.3 Malware Propagation
      • 9.4 Trojan Concept
      • 9.5 Use of Trojan by hacker
      • 9.6 Infecting Systems through Trojan
      • 9.7 Deploying Trojan
      • 9.8 Virus And warm
      • 9.9 Stage of Virus Life
      • 9.10 Working With Viruses
      • 9.11 Ransomware
      • 9.12 Types Of Virus
      • 9.13 Computer Warms
      • 9.14 Malware Reverse Engineering
      • 9.15 Malware analysis Procedure
      • 9.16 Malware Detection
      • 9.17 Detecting Trojans
      • 9.18 Detecting Viruses
      • 9.19 Introduction to Keyloggers/RATS
      • 9.20 Types of Keyloggers/RATS
    1. 10. Security Polices and Incidence Management
      • 10.1 Incidence Management
      • 10.2 Benefits of Incidence Management
      • 10.3 The Incidence Management Process
      • 10.4 Best Practice For Implementing Management
      • 10.5 Importance Of Security Policy
      • 10.6 Acceptable Encryption Policy
      • 10.7 Acceptable Use Policy
      • 10.8 Clean Desk Policy
      • 10.9 Data Breach Response Policy
      • 10.10 Disaster Recovery Plan Policy 58
      • 10.11 Digital Signature Acceptance Policy
      • 10.12 Email Policy
      • 10.13 Ethics Policy
      • 10.14 Pandemic Response Planning Policy
      • 10.15 Password Construction Guideline
      • 10.16 Password Protection Policy
      • 10.17 Security Response Plan Policy
      • 10.18 End Users Encryption Key protection Policy
      • 10.19 Acquisition Assessment Policy
      • 10.20 Bluetooth Baseline Requirements Policy
      • 10.21 Remote Access Police
      • 10.22 Remote Access Tools Policy
      • 10.23 Router And Switch Security Policy
      • 10.24 Wireless Communication Policy
      • 10.25 Wireless Communication Standard
      • 10.26 Database Credentials Policy
      • 10.27 Technology Equipment Disposal Policy
      • 10.28 Information Logging Standard
      • 10.29 Lab Security Policy
      • 10.30 Server Security Policy
      • 10.31 Software Installation Policy
      • 10.32 Workstation Security Policy
      • 10.33 Application Security
      • 10.34 Web Application Security Policy

  • Course Content

    1. 1. Set Up a Lab Environment
      • 1.1 Installation of Kali Linux and Virtual Operating System Platforms
      • 1.2 Weaponing Wi-Fi Environments
      • 1.3 Introduction of Web Security & Auditing
      • 1.4 Importance / Scope of Web Auditing
    2. 2. Hosting Server
      • 2.1 Shared Server Linux, Windows
      • 2.2 Shared V/s VPS V/s Dedicated Servers
      • 2.3 Virtual Private Server
      • 2.4 WHMCS Reseller Server
    3. 3. Process of Website/Web Application
      • 3.1 Website Hosting
      • 3.2 Life Cycle of Website Building.
      • 3.3 Types of Websites
      • 3.4 Domain Purchasing
      • 3.5 Domain Link With Hosting
      • 3.6 Name Server
    4. 4. Understanding CPanels and Its Functions
      • 4.1 File Manager in CPanel
      • 4.2 Audit Website Accesses
      • 4.3 Mail Server Setup
      • 4.4 SSH Setup
      • 4.5 Configuration of IDS
      • 4.6 Managing Sub Domains
    5. 5. Staying Anonymous Techniques
      • 5.1 VPN, RDP, Proxy, Socks
      • 5.2 Virtual Private Network Setup
      • 5.3 Virtual Private Network Usage
      • 5.4 RDP Setup
      • 5.5 RDP Usage
      • 5.6 Proxy Setup
      • 5.7 Socks Setup
    6. 6. TOR Networks
      • 6.1 Understanding TOR
      • 6.2 Setup TOR Network
      • 6.3 Build Own TOR Network
    7. 7. Website Cloning
      • 7.1 Clone Any Website Using Httrack
      • 7.2 Clone Any Website Using Website Copier
    8. 8. Detect Technologies/Scripts
      • 8.1 Website CMS Scanner
      • 8.2 Website Banner Grabbing
      • 8.3 Enumeration Techniques for Website Information Extracting
    1. 9. Different Types of CMS (Wordpress / Joomla / myBB)
      • 9.1 Installation of WordPress (Step by Step)
      • 9.2 Understanding how Website can be Hosted using CMS.
      • 9.3 Advantage / Disadvantage of CMS
    2. 10. Google Dorks in Action
      • 10.1 How Google Dork Works
      • 10.2 Google Search Engine Algorithms
      • 10.3 Different types of Google Dorks
    3. 11. Collect Sensitive Information About the Target.
      • 11.1 Foot printing and web enumeration techniques
      • 11.2 Who is lookup
      • 11.3 Domain Reverse Lookup
    4. 12. Burpsuit
      • 12.1 What is Burp Suite
      • 12.2 Burp Scanner
      • 12.3 Spidering Whole Websites
      • 12.4 Find Fuzzy / Important Files
      • 12.5 Intercepting Website Traffic and Tampering it
    5. 13. Acunetix (Web Vulnerability Scanner)
      • 13.1 Scanning Entire Website
      • 13.2 Learn Capturing Login Sequence to perform authorized scan.
      • 13.3 Advantage / Disadvantage of Acunetix Web Vulnerability Scanner
    6. 14. Websites Vulnerabilities and Attacks
      • 14.1 Understand Open Web Application Security Project
      • 14.2 OWASP Top 10 Most Critical Web Application Security Risks
      • 14.3 SQL Login Bypass Vulnerabilities.
      • 14.4 Denial of Service (Web Applications)
      • 14.5 Broken Authentication and Sessions Management
      • 14.6 Cross Site Scripting (XSS) Vulnerabilities
      • 14.7 SPF/TXT RECORD NOT FOUND Vulnerabilities.
      • 14.8 HOST HEADER Vulnerabilities
      • 14.9 Detect and Exploit Cross Site Request Forgery (CSRF) Vulnerabilities
      • 14.10 Command Execution Vulnerabilities
      • 14.11 Uncover and Exploit SQL Injection Vulnerabilities.
      • 14.12 Uncover and Exploit Script Source Code Disclosure Vulnerabilities.
      • 14.13 File Upload (Shell Upload) Vulnerabilities
      • 14.14 All About Web Shells and Its Functionalities
      • 14.15 Building / Exploiting Web Based Backdoors/Payloads
      • 14.16 All About Bug Bounty

  • Course Content


  • Course Content

    1. 1. Network Hacking & Security
      • 1.1 network Footprinting
      • 1.2 Network Scanning
      • 1.3 Network Mapping
      • 1.4 TCP Communication
      • 1.5 Creating Custom Data Packets Using TCP Flags
      • 1.6 Live System Scanning
      • 1.7 Port Scanning
      • 1.8 Scanning Beyond IDS
      • 1.9 Banner Grabbing
      • 1.10 Tech of Enumeration
      • 1.11 Netbios Enumeration
      • 1.12 Netbios Enumeration Tool: Superscan
      • 1.13 Tool: Net BIOS Enumeration
      • 1.14 NBT State, Super Scan
      • 1.15 ID Server, Nmap, NetCat, Net Craft, CURL
      • 1.16 NET Penetration Testing Using Android
    2. 2. IP, MAC & Proxy Hacking & Security
      • 2.1 Proxy Preparing
      • 2.2 Proxy Chaining
      • 2.3 Proxy Tools
      • 2.4 Proxy & VPN
      • 2.5 Ip Spoofing
      • 2.6 Ip Spoofing Detection-Ip Identification Number
      • 2.7 Ip Spoofing Detection-Direct TTL Probes
      • 2.8 Ip Spoofing Counter Measures
      • 2.9 Scanning Pen Testing
      • 2.10 MAC Spoofing-SMAC
      • 2.11 Defend Against MAC Spoofing
    3. 3. Sniffing Techniques & Security
      • 3.1 What Is Sniffer
      • 3.2 Types of Sniffer:Passive Sniffer/Active Sniffer
      • 3.3 Sniffer: Wireshark CACE Pilot
      • 3.4 Password Sniffer: ACE
      • 3.5 Employee Tracking Active Track
      • 3.6 Packet Sniffer Capsa Network
      • 3.7 Sniffing Prevention/ Detection Technique
    4. 4. Offline Password Hacking & Security
      • 4.1 OS, BIOS Password
      • 4.2 Recovery (Windows, Linux)
      • 4.3 Password Recovery And Dumping (Passcap)
      • 4.4 Application Password Cracking
      • 4.5 Wifi- Password Recovery
      • 4.6 Strong And Unbreakable Password
    5. 5. Metasploit : Payloads Godfather
      • 5.1 Metasploit Basic Command Tutorial
      • 5.2 Metasploit Desktop Exploit
      • 5.3 Advanced Penetration Using Metasploit
      • 5.4 Integrated Nessus With MT And Kali Linux
      • 5.5 Autopwn Metasploit
    6. 6. Vulnerability Assessment and Pentesting
      • 6.1 Vulnerability Assessment
      • 6.2 Type of Vulnerability Assessment
      • 6.3 Vulnerability Research
      • 6.4 Web Server Attacks
      • 6.5 Website Attacks Methodology
      • 6.6 Website Information Gathering
      • 6.7 Web Server Footprinting
      • 6.8 Mirroring a Website
      • 6.9 Vulnerability Scanning
      • 6.10 Web Server Security Scanner: Acunetix Scanner
      • 6.11 Burp Suites Professional - Vulnerability Scanner
      • 6.12 Session Hijacking
      • 6.13 Hacking Web Passwords
      • 6.14 Web Application Hacking
      • 6.15 Web Application Threats
      • 6.16 Invalidated Input
      • 6.17 Parameter/ Form Temporizing
      • 6.18 Directory Traversal
      • 6.19 Security Misconfiguration
      • 6.20 Cross Site Scripting Attacks (XSS)
      • 6.21 Cross Site Request Forgery Attacks (CSRF)
      • 6.22 Denial of Service Attacks in Web Application
      • 6.23 Web Application Hacking Tools
      • 6.24 SQL Injection Concept
      • 6.25 Types of SQL Injection
      • 6.26 Error Base SQL Injection
      • 6.27 Blind SQL Injection
      • 6.28 SQL Injection Tools (Desktop & Mobiles)
      • 6.29 Wordpress Security Scanner-Wpscan
    1. 7. Cloud Computing & Infrastructure
      • 7.1 Cloud Computing
      • 7.2 Types Of Cloud Computing Services
      • 7.3 SaaS (Software as a Service)
      • 7.4 LaaS (Infrastructure as a Service)
      • 7.5 PaaS (Platform as a Service)
      • 7.6 NaaS ( Network as a Service)
      • 7.7 XaaS (Anything as a Service)
    2. 8. Wi-Fi Hacking & Security
      • 8.1 Social Engineering Toolkit
      • 8.2 Wireless Concept
      • 8.3 Wireless technologies
      • 8.4 Service Set Identifier (SSID)
      • 8.5 WiFi Authentication Modes
      • 8.6 WiFi Chalking
      • 8.7 Wireless Antenna
      • 8.8 Wireless Encryption
      • 8.9 WEP Encryption
      • 8.10 WPA Encryption
      • 8.11 WPA2 Encryption
      • 8.12 Wireless Hacking Methodology
      • 8.13 WiFi Discovery
      • 8.14 GPS Mapping
      • 8.15 Wireless Traffic Analysis
      • 8.16 Launch Wireless Attack
      • 8.17 Crack Wireless Encryption
      • 8.18 WiFi Jammer / Signal Blocking
      • 8.19 Rouge Access Point
      • 8.20 Fluxion / AirGeddon WiFi Attack
      • 8.21 Secure WiFi Router
    3. 9. Smart Phone Hacking & Security
      • 9.1 Security For Smart phones
      • 9.2 Anti Virus for Android
      • 9.3 Android phones Rooting
      • 9.4 Mobile Spy-Android/Iphone
      • 9.5 Droid Jack-Remote Phone Hack
      • 9.6 Application For Rooted And Android Phone
      • 9.7 Networking Hacking Using Mobile Phone (Android)
      • 9.8 Penetration Testing in Root Word
      • 9.9 Latest Tools & Techniques

  • Course Content

    1. 1.Cyber Security Introduction
      • 1.1 Type of Cyber Security
      • 1.2 Real Vs Virtual World
      • 1.3 Cyber Fraud
    2. 2. Desktop Security
      • 2.1 Cut/Copy/Paste Prevention
      • 2.2 Protect PC from anonymous USB Storage
      • 2.3 Technique for Generate Secret Key
      • 2.4 Audit anonymous access of confidential File
      • 2.5 Increase System Performance without HW/SW
      • 2.6 Track file/Folder access
      • 2.7 Add application into Right Click Menu
      • 2.8 Hide Important Drive
      • 2.9 Restore Data in case of Crash Computer
      • 2.10 Customize Default Screen Sever
      • 2.11 Enable or Disable Task Manager
    3. 3. Online/UPI/ Activity Precautions
      • 3.1 Prevention against online line fraud
      • 3.2 Use the Address Verification System
      • 3.3 Introduction of UPI flow
      • 3.4 Check genuineness of E-commerce Website
      • 3.5 Technique for Net Banking/UPI transaction security
    4. 4. Email Security
      • 4.1 Secure Password even password theft
      • 4.2 Monitor Chrome Activity though email
      • 4.3 Monitor Mobile Activity
      • 4.4 Audit delete activity
    1. 5. Social Media Protection
      • 5.1 2F Authentication
      • 5.2 Maintain Recovery Options
      • 5.3 Imposter account handling
      • 5.4 Phishing attacks and scams
      • 5.5 Login Alert Notifications
      • 5.6 Monitor Suspicious Activity
      • 5.7 Keep Profile Picture Away from Hacker
      • 5.8 Store Locally Post/Images/Other Contents
      • 5.9 Live Event
    2. 6. Messaging App Privacy
      • 6.1 Application Lock
      • 6.2 Hide Messaging applications
      • 6.3 Encrypt Data
      • 6.5 Protect from Download/Save sent Images
      • 6.6 Auto Deleted Confidential sent Message
      • 6.7 Undo Deleted Message
      • 6.8 Hide Identity in Whatsapp
    3. 7. Child Activities Monitoring
      • 7.1 Device Recent and Live Location Tracking
      • 7.2 Log Searches in Device
      • 7.3 Monitor Web Activities
      • 7.4 Parental Control Over the Device
      • 7.5 Log Applications
    4. 8. Mobile Security & Tracking
      • 8.1 Monitor Mobile Activity
      • 8.2 Track Lost/Stolen Mobile
    5. 9. Current Tools & Technology