Home
Services
Consultancy
R&D
Training
Blogs/Vblogs
Contact
Training
Our Courses
Pen-Testing and Ethical Hacking
Infrastructure Pentesting
Information Gathering
Scanning Techniques
Network Attacks (SSH, SMTP, SMB, DNS, DHCP, etc)
Vulnerability Assessment
Exploitation (Windows, Linux, Routers and Switches)
Post Exploitation (Maintain Access, Privilege Escalation)
Web Application Pentesting
Information gathering
OWASP top 10
Session Security
Authentication and Authorization
SQL Injection
XSS
CRSF
File Inclusion
Web shell
Mobile Device Pentesting
mobile OSs security mechanisms and implementations
mobile applications static and dynamic analysis
Mobile OS architecture and design
Android: Device rooting, Tapjacking, etc
IOS: Authorization, jailbreaking, etc.
Wireless Network Pentesting
Bypassing WLAN Authentication – Shared Key, MAC Filtering, Hidden SSIDs
Cracking WLAN Encryption – WEP, WPA/WPA2 Personal and Enterprise
Attacking the WLAN Infrastructure – Rogues Devices, Evil Twins, DoS Attacks, MITM
Advanced Enterprise Attacks – 802.1x, EAP, LEAP, PEAP, EAP-TTLS
Attacking the Wireless Client – Honeypots and Hotspot attacks, Caffe-Latte, Hirte, Ad-Hoc Networks and Viral SSIDs, WiFishing
Breaking into the Client – Metasploit, SET, Social Engineering
Enterprise Wi-Fi Worms, Backdoors and Botnets
System Security
Compiled and decompiled programs
Winding the stack
Foundations of reverse engineering
Basics of Buffer Over flows.
Scripting for Security Professional:
Ruby and Python for Information Security
Java Scripting for Security Professionals
Exploitation Research
Windows App Reverse Engineering
Debuggers
Stack and Heap Overflow
Kernel Flows
Automation
Linux App Reverse Engineering
Debuggers
Stack and Heap Overflow for Linux OS
Kernel Flows
Automation for Linux OS
Malware Analysis
Shell Coding for 32 and 64 bit Application
Static Analysis
Dynamic Analysis
Memory-based Malware
Machine Learning and Artificial Intelligence
Machine Learning using Python
Machine Learning using R
Artificial Intelligence for cyber security
Share by: