Cyber Security Training at IPSolutions

SANJEET MISHRA - CYBER SECURITY ADVISOR

One of Certified Instructor from Both Governing body : EC-COUNCIL & MILE 2 CYBER SECRUITY

CYBER SECURITY TRAINING in MUMBAI

1.Introduction to Ethical Hacking

  • Intro to Ethical Hacking and Cyber Security
  • Phases of Hacking
  • Introduction to Networking & IP addressing.
  • Decide your target
  • Way back machine
  • Introduction to packets
  • Nslookup
  • Nbtstat
  • Netstat
  • CMD FOR VMWARETOOLS KALI LINUX
  • Google dorks best with example
  • Google open mail hacking
  • Kali Linux Installation
  • Kali Linux mac changer
  • live camera hacking open
  • Tor proxy Setting and Introduction to VPN

2.Foot Printing & Reconnaissance

  • Collecting information of website(Target)
  • Dmitry
  • Sparta
  • Netdiscover
  • httrack or web data extractor, offline browsers

3.Scanning Networks

  • Advance IP Scanner
  • Advance PORT Scanner
  • NMAP/ZENMAP
  • Domain Scanning
  • System Scaning
  • ISP Scaning
  • Angry IP Scanner

5.LIVE System Hacking

  • Creation of Payloads & migration of Payloads.
  • Different types of payloads.
  • Gaining root access and Becoming Admin of Victim
  • Making User as well as enabling Remote desktop of Victim Machine
  • Uploading and Downloading files
  • Enabling and Disabling mouse and keyboard
  • Creating Folders on Victim Machine
  • Details of System Machine
  • Basic Commands for Victim Hacking
  • Deleting all accounts
  • Clearing events
  • how to check my system
  • Hacking Web Camera
  • Hacking Live Session

 

6.Malware Threats

  • Different types of payloads
  • Creation of word,ppt,winrar,PDF,mp3 payloads
  • ALL METESPLOIT DETAILS kali tools live

7.Sniffing

  • Sniffing Packets as well as Network Minor
  • Wireshark with PCAP
  • Cain and Able
  • Others Packets Capturing Tools /

8.Social Engineering

  • Setoolkits Live
  • Phisings Attack
  • Pharming Attacks
  • Media Generator Attack
  • QR-Code Generator Attack
  • Hacking Live Page Contents.

9.Denial of Service

  • dos Attack
  • ddos Attack

10.Session Hijacking

11.Hacking Webservers

12.Hacking Web Application

  • w3af_gui
  • owasp-zap scan
  • skipfish
  • wordpress scan
  • Golismero

13.SQL Injection

  • nikto practicals
  • uniscan
  • sql login bypass
  • sqlinjection Types

14.Hacking Wireless Networks

  • how to generate wordlist
  • wifi hacking via reaver
  • kismet
  • fern
  • Creating Fake AP
  • how to change into monitor mode

15.Hacking Mobile Platforms

  • Tracking Mobile No.
  • Tracking Live Location
  • Hacking SMS
  • Hacking Contacts
  • Hacking Whatsapp
  • Hacking SD Card
  • Hacking Application Data

16.Evading IDS,Firewalls & Honeypots

  • kfsensor
  • Live Lab with Attack

17.Cloud Computing

  • Websploit
  • Oscanner
  • Word press Scanning
  • Finding Admin Panel of Website
  • Finding Mail Access of Website
  • Finding Firewall Details
  1. Cryptography and Its Types.
  2. Introduction to VAPT and Its Types
  3. One Sample Project of VAPT
  4. Introduction to Bug Bounty
  5. Cyber Law & IT Acts of INDIA
  6. Latest News and Updates on Cyber Security