Advance diploma in information security

Ethical Hacking


  • Chapter 1 - Introduction
  • Chapter 2 - Networking
  • Chapter 3 - Footprinting/Reconnaissance
  • Chapter 4 - Google Hacking-Google Dorks
  • Chapter 5 - Scanning
  • Chapter 6 - System Hacking: Win7 and Linux
  • Chapter 7 - Android & iPhone Hacking
  • Chapter 8 - Malwares/virus
  • Chapter 9 - SQL Injection
  • Chapter 10 - Cross Site Scripting(xss)
  • Chapter 11 - Sniffing
  • Chapter 12 - Social Engineering
  • Chapter 13 - Identity Theft Fraud
  • Chapter 14 - Denial of Service
  • Chapter 15 - Session Hijacking
  • Chapter 16 - Penetration Testing
  • Chapter 17 - Exploit Writing & Buffer Overflow
  • Chapter 18 - Cryptography & Steganography
  • Chapter 19 - Firewalls & Honeypots
  • Chapter 20 - IDS & IPS
  • Chapter 21 - Hacking Web Server
  • Chapter 22 - Wireless Hacking
  • Chapter 23 - Physical Security
  • Chapter 24 - Reverse Engineering
  • Chapter 25 - Email Hacking
  • Chapter 26 - Security Compliance & Auditing
  • Chapter 27 - Incident Handling & Computer forensics

Introduction To LINUX Operating System And Virtual Machines


  • Kali Linux
  • Back Box
  • BackTrack operating ayatems
  • Ubuntu
  • Parrot os
  • virtual Box
  • VM ware

WEB APPLICATION SECURITY


  • Chapter 1 - Web Architectures
  • Chapter 2 - Web Application Introduction
  • Chapter 3 - PHP-Basics
  • Chapter 4 - Sessions & Cookies
  • Chapter 5 - XSS Attacks
  • Chapter 6 - Advanced SQLI(Bypassing Mod_security)
  • Chapter 7 - Cross Site Request Forgery
  • Chapter 8 - Session Hijacking
  • Chapter 9 - Web based DDOS Attacks
  • Chapter 10 - PHP Injection
  • Chapter 11 - Web Based Worms
  • Chapter 12 - Flash based Web Attacks
  • Chapter 13 - I-Frame based Web Attacks
  • Chapter 14 - Clickjacking
  • Chapter 15 - Attack frameworks: AttackAPI & BeEF
  • Chapter 16 - Penetration testing on DVWA
  • Chapter 17 - Honeytokens
  • Chapter 18 - OWASP Top 10
  • Chapter 19 - Metasploit and Web Application
  • Chapter 20 - PHP Curl
  • Chapter 21 - Automated Bots
  • Chapter 22 - Phishing 2.0
  • Chapter 23 - Brute forcing Web Applications
  • Chapter 24 - Compliance Methodologies and Legalities

NETWORK SECURITY


  • Chapter 1 - Network Topology
  • Chapter 2 - Open Systems Interconnectivity Model
  • Chapter 3 - TCP/IP In-depth
  • Chapter 4 - WAP, NAT, DNS and ICMP
  • Chapter 5 - Internet Routing
  • Chapter 6 - Advanced Port Scanning
  • Chapter 7 - Sniffing Attacks
  • Chapter 8 - Masquerading Attacks
  • Chapter 9 - Advanced DOS and DDOS
  • Chapter 10 - Session Hijacking Attacks
  • Chapter 11 - Network Operations Center - Security
  • Chapter 12 - Network Traffic Analysis
  • Chapter 13 - Network Vulnerability Assessment
  • Chapter 14 - Network Penetration Testing
  • Chapter 15 - Intrusion Detection System
  • Chapter 16 - Snort 101
  • Chapter 17 - OSSEC 102
  • Chapter 18 - Intrusion Prevention System
  • Chapter 19 - Firewalls (Installation, Configuration and Usage)
  • Chapter 20 - OS Hardening for Networks - Linux and Windows
  • Chapter 21 - Cryptography - Introduction
  • Chapter 22 - Symmetric Key Encryption
  • Chapter 23 - Asymmetric Key Encryption
  • Chapter 24 - Hash functions
  • Chapter 25 - Trust models
  • Chapter 26 - VLAN - Security
  • Chapter 27 - VPN - Security
  • Chapter 28 - Wireless Networks - Introduction
  • Chapter 29 - Radio Frequency Essentials
  • Chapter 30 - Wireless Security - Basics
  • Chapter 31 - Wireless Threats
  • Chapter 32 - Attacking Wireless Hotspot and Security
  • Chapter 33 - WEP Security
  • Chapter 34 - WPA/WPA2 Security
  • Chapter 35 - Secure Wireless Infrastructure Deployment
  • Chapter 36 - DNS Tunneling
  • Chapter 37 - Network Forensic Methodology
  • Chapter 38 - Network Evidence Acquisition
  • Chapter 39 - OS Logs and Splunk
  • Chapter 40 - Summary

EXPLOIT WRITING


  • Chapter 1 - Introduction to Exploit Writing
  • Chapter 2 - Programming & Basics
  • Chapter 3 - Assembly language
  • Chapter 4 - Debugging
  • Chapter 5 - Stack Based Buffer Overflow
  • Chapter 6 - Understanding Windows Shellcode
  • Chapter 7 - Fuzzers
  • Chapter 8 - Heap Based Overflow
  • Chapter 9 - Exploiting /GS Canary Protected Programs
  • Chapter 10 - Exploiting SafeSEH Protected Programs
  • Chapter 11 - Denial of Service
  • Chapter 12 - Bypassing DEP & ASLR
  • Chapter 13 - Advanced Shellcoding (Win32 Egghunting, Connect-back, Staged, Alphanumeric)
  • Chapter 14 - Encoders & Writing Custom Encoders
  • Chapter 15 - DLL Hijacking
  • Chapter 16 - Client Side Exploits
  • Chapter 17 - From Vulnerability to Exploit
  • Chapter 18 - Metasploit Framework
  • Chapter 19 - Binary payloads & Antivirus Evasion
  • Chapter 20 - Exploit to Metasploit
  • Chapter 21 - Capture The Flag Exercise
  • duration:300HRs