Cyber Security Course Training Institute

Cyber Security Course Training Institute

Cyber Security

  • Why Security ?
  • Why Attacks ?
  • Hacking – Introduction
  • Types of Hackers
  • Malicious Hacker Strategies
  • Ethical Hacker Strategies
  • Steps for conducting Ethical Hacking
  • Importance of Vulnerability Research.
  • Vulnerability Research References.
  • Conclusion  
  • Types Cyber Crimes
  • Reporting Cyber Crimes & Incidence response
  • Introduction to IT Act 2000 & its sections
  • Installation & Configuration
  • Installing Applications on Virtual Machine
  • Advantages of Virtual Machine
  • Setting up a test lab on a single machine
  • Setting up a test lab on multiple machines Where to get vulnerable target machines Take Backup & Save Trouble in Future  
  • WHOIS Information Gathering
  • DNS Information Gathering
  • DNS Report
  • MX-information
  • NS LookUp
  • Website Mirroring
  • Website Information Gathering Email Information Gathering Doxing (Peoples & Digitals Boxes)
  • Tools that aid in Information Gathering
  • Savitabhabhi.com Case Study
  • Maltego & Kartoo Search Engines
  • IP address
  • Versions of IP Address
  • Types of IP Address
  • Classes of IP addresses Categories of IP Address Network Address Translation TCP protocol
  • UDP Protocol
  • Difference between TCP & UDP Proxies and VPN’s
  • Why Scanning?
  • Types of Scanning
  • Objective of Scanning. Port Scanning
  • Port Scanning Techniques.
  • Port Scanning using Nmap
  • Advance Nmap Scanning(Nmap Scripting Engine) Banner Grabbing
  • Network Scanning Techniques
  • Enumeration
  • What is HTTP ? What is HTTPS ?
  • Difference between HTTP & HTTPS HTTP & HTTPS concepts
  • What is a Proxy Server?
  • Types of Proxy Server
  • Proxy Vs VPN Servers
  • How To Use a Proxy?
  • How to choose VPN servers?
  • What is Virus?
  • What are Worms?
  • Difference between Virus & Worms
  • What are Trojans?
  • How Trojans Work?
  • How to hack a computer system using Trojan? How to create a Trojan?
  • Introduction to some RAT Tools
  • Issues in sending and executing a Trojan
  • Overcoming above issues
  • Introduction to Wireshark
  • Understanding and working with different filters
  • History of Phishing What is Phishing? Types of Phishing
  • Why it is called as a Social Engineering Technique?
  • Steps to perform Phishing
  • Tricks to perform Phishing
  • Precautions against Phishing Attempts Detecting Phishing Crimes Investigating Phishing Crimes
  • Introduction to RE Briefing OllyDbg
  • Patching
  • Keygening
  • Countermeasures
  • finding a valid bug and reporting it to the organization
  • Companies such as Hackerone, Bugcrowd, Bugwolf, CrowdSecurify and Hatforce set up and run bug bounty programs
  • What is a OWASP?
  • Understanding OWASP
  • Introduction to OWASP Top 10 Vulnerabilities
  • Damn Vulnerable Web Application Testing and Tutorial
  • Burp Interceptor
  • Burp Target
  • Burp Spider
  • Burp Scanner Burp Intruder Burp Repeater Burp Decoder Burp Sequencer Burp Extender
  • Burp App Store- Introduction
  • Live Hacking Through Burp
  • Session Management Implementation
  • Transport Layer Security
  • Cookie Attributes ?
  • Session Expiration
  • Client-Side Defenses for Session Management
  • Understanding how Google works
  • Google basic operators
  • Google advanced operators
  • Automated Google tools
  • How to use Google to find the desired website
  • How Google can aid in searching vulnerable website
  • What is Authentication? Basic Authentication Bypass Basic Combinations to Bypass Bypass Cheat Sheet Remediation Approach
  • Database Basics
  • What is SQL?
  • Basics of SQL Query
  • Union based SQL Injection
  • Error based SQL Injection
  • What is Blind SQL Injection?
  • Time-based SQL Injection
  • Boolean based SQL injection
  • What is WAF?
  • Working of WAF
  • How to know if there is a Web Application Firewall?
  • Techniques to Bypass WAF
  • Video Demonstration – SQL Injection Firewall Evasion
  • Scope of this technique
  • What is OTP?
  • OTP generation
  • OTP brute-forcing
  • What is a Shell?
  • What is LFI?
  • What is RCE?
  • RCE Exploitation Demo
  • What is XSS?
  • How to find it?
  • XSS Reflected & Stored
  • XSS DOM Based
  • Introduction to this framework
  • Getting hands on commands
  • Hacking windows with Metasploit
  • Hacking Linux with Metasploit
  • Android Hacking using Metasploit
  • MSFVenom – Payload creation
  • MSFVenom - Creating Malicious PDF Files through MSF Modules
  • Wireless Protocols
  • Wireless Routers-Working
  • Attacks on Wireless Routers
  • Cracking Wireless routers password(WEP)
  • Wi-Fi Phisher
  • Securing routers from Hackers
  • Countermeasures
  • Introduction to Wanna cry ransomware
  • Understanding the working of Wanna cry
  • Hands on practical with metasploit
  • Expoliting the vulnerability
  • Types of Penetration Testing
  • Do-It-Yourself Testing
  • Outsourcing Penetration Testing Services
  • Terms of Engagement
  • Project Scope & Pentest Service Level Agreements
  • Testing points & Locations
  • Automated & Manual Testing

Creative Design & Multimedia Insitute

4.8

average based on 339 ratings

Powered by Google
5 Star
94.69%
4 Star
0.88%
3 Star
0%
2 Star
0.29%
1 Star
4.13%
Reviews
  • Around World

    I learned Web Development at creative multimedia, the fundamentals were covered before advanced concepts. The mentor and support staff cleared all my doubts.

  • denu asodariya

    Creative multimedia institute is very good institute for IT training; I have completed web design course from here and got placed on Company as Web designer. This institute gives me very good career, thank you Creative.

  • srushti badarukhiya

    Creative multimedia institute gives us flexibility in timing for practical which help professionals / working people a lot to complete their course in time.

  • Moni patel

    Creative multimedia institute gives us flexibility in timing for practical which help professionals / working people a lot to complete their course in time.

  • Umesh Prajapati

    Creative multimedia institute is very famous in Surat and its staff members are very competent and co-operative.Every course and course module have an exam system motivation in Creative multimedia institute.every student has to do good amount practice which makes them perfect in their course.

  • Amazing Video show

    Creative Design & Multimedia Institute provides best training in android. I learn android app development in Creative Design & Multimedia Institute. This is the one of the most best institute for training. Rajni sir is a dynamic trainner for android.

  • Drashti Dobariya

    CREATIVE DESIGN & MULTIMEDIA INSTITUTE is really a nice Coaching institute. We did only one month Android App Development Course. Our trainer was Mr. Rajni sir. He is a very nice Teacher. He always treat us nicely. His style of delivering new concepts was very nice. Apart from teaching us basics of development of Android , he used to tell

  • Bhavik Gondha

    CREATIVE DESIGN & MULTIMEDIA INSTITUTE is the best training center in every aspect, either it is about the course fee or about the trainer. I am thankful to the institute for improving my Game Design skills

  • chandresh dhaduk

    Hello guys I am Jai Kumar from Surat. I done Game Design course from here. After finishing my Game Design course I simply got recruited to a MNC company.

  • Raj Ghodasara

    I get Game Design admission in CREATIVE DESIGN & MULTIMEDIA INSTITUTE training institute. I would like to say that it is the first-rate institute in Surat. Now, I am working in a private firm in Surat.

  • Cyber Security Expert
Related Courses
Master In Blockchain training in surat

Master In Blockchain

Maste In BlockChain

Desktop App Development training in surat

Desktop App Development

Desktop App Development