ADVANCE DIPLOMA IN INFORMATION SECURITY

Chapter 1 - Introduction
Chapter 2 - Networking
Chapter 3 - Footprinting / Reconnaissance
Chapter 4 - Google Hacking
Chapter 5 - Scanning
Chapter 6 - Android Hacking
Chapter 7 - Malware
Chapter 8 - Sql Injection
Chapter 9 - Cross Site Scripting
Chapter 10 - Sniffing
Chapter 11 - Social Engineering
Chapter 12 - Identity Theft Fraud
Chapter 13 - Denial Of Service
Chapter 14 - Penetration Testing
Chapter 15 - Password Cracking
Chapter 16 -Cryptography & Steganography
Chapter 17 - Sniffers
Chapter 18 - Mail Clients Security
Chapter 19 - Social Media Hacking /Phishing
Chapter 20 - Wireless Hacking
Chapter 21 - Physical Security
Chapter 22 - Email Hacking
Chapter 23 -Report Writing
Chapter 24 - Computer Forensics
Chapter 1 - Web Architectures
Chapter 2 - Web Application Introduction
Chapter 3 - Php-Basics
Chapter 4 - Sessions & Cookies
Chapter 5 - Xss Attacks
Chapter 6 - Advanced Sqli
Chapter 7 - Cross Site Request Forgery
Chapter 8 - Session Hijacking
Chapter 9 - Web Based Ddos Attacks
Chapter 10 - Php Injection
Chapter 11 - Web Based Worms
Chapter 12 - I-Frame Based Web Attacks
Chapter 13 - Clickjacking
Chapter 14- Attack Frameworks:Attackapi & Beef
Chapter 15 - Penetration Testing OnDvwa
Chapter 16 - Hacking Web Server
Chapter 17 - Owasp Top 10
Chapter 18 - Metasploit And Web Application
Chapter 19 - Reverse Engineering
Chapter 20 - Automated Bots
Chapter 21 - Phishing 2.0
Chapter 22 - Brute Forcing Web Applications
Chapter 23 - Compliance Methodologies And Legalities
Chapter 1 - Network Topology
Chapter 2 - Open Systems Interconnectivity Model
Chapter 3 - TCP/IP In-depth
Chapter 4 - WAP, NAT, DNS and ICMP
Chapter 5 - Internet Routing
Chapter 6 - Advanced Port Scanning
Chapter 7 - Sniffing Attacks
Chapter 8 - Masquerading Attacks
Chapter 9 - Advanced DOS and DDOS
Chapter 10 - Session Hijacking Attacks
Chapter 11 - Network Operations Center -Security
Chapter 12 - Network Traffic Analysis
Chapter 13 - Network Vulnerability Assessment
Chapter 14 - Network Penetration Testing
Chapter 15 - Intrusion Detection System
Chapter 16 - Solar winds
Chapter 17 - Glasswire
Chapter 18 - Intrusion Prevention System
Chapter 19 - Firewalls (Installation, Configuration, and Usage)
Chapter 20 - OS Hardening for Networks -Windows
Chapter 21 - Cryptography - Introduction
Chapter 22 - Symmetric Key Encryption
Chapter 23 - Asymmetric Key Encryption
Chapter 24 - Hash functions
Chapter 25 - Trust models
Chapter 26 - VLAN - Security
Chapter 27 - VPN – Security
Chapter 28 - Wireless Networks - Introduction
Chapter 29 - Radio Frequency Essentials
Chapter 30 - Wireless Security – Basics
Chapter 31 - Wireless Threats
Chapter 33 - WEP Security
Chapter 34 - WPA/WPA2 Security
Chapter 35 - Secure Wireless Infrastructure Deployment
Chapter 36 - DNS Tunneling
Chapter 1 - Introduction to Exploit Writing
Chapter 2 - Programming & Basics
Chapter 3 - Assembly language
Chapter 4 - Debugging
Chapter 5 - Stack Based Buffer Overflow
Chapter 6 - Understanding Windows Shellcode
Chapter 7 - Fuzzers
Chapter 8 - Heap Based Overflow
Chapter 9 - Exploiting / GS Canary Protected Programs
Chapter 10 - Exploiting Safe SEH Protected Programs
Chapter 11 - Denial of Service
Chapter 12 - Bypassing DEP & ASLR
Chapter 13 - Advanced Shellcoding (Win32Egghunting, Connect-back, Staged,Alphanumeric)
Chapter 14 - Encoders & Writing Custom Encoders
Chapter 15 - DLL Hijacking
Chapter 16 - Client Side Exploits
Chapter 17 - From Vulnerability to Exploit
Chapter 18 - Metasploit Framework
Chapter 19 - Binary payloads & Antivirus Evasion
Chapter 20 - Exploit to Metasploit
DURATION:300HRs

GET GUIDANCE FROM EXPERT COUNSELORS


Get Guidance from Expert Counselors
close slider