Ethical Hacking and Countermeasures Certification
- Introduction to Ethical Hacking
- Foot-printing And Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT Hacking
- Cloud Computing
- Cryptography
Penetration Testing and Security Analyst Certification
- Introduction to Penetration Testing and Methodologies
- Penetration Testing Scoping and Engagement Methodology
- Open-Source Intelligence (OSINT) Methodology
- Social Engineering Penetration Testing Methodology
- Network Penetration Testing Methodology - External
- Network Penetration Testing Methodology – Internal
- Network Penetration Testing Methodology - Perimeter Devices
- Web Application Penetration Testing Methodology
- Database Penetration Testing Methodology
- Wireless Penetration Testing Methodology
- Cloud Penetration Testing Methodology
- Report Writing and Post Testing Actions
Cyber Forensics Certification
- Computer Forensics in Today'sWorld
- Computer Forensics InvestigationProcess
- Understanding Hard Disks and FileSystems
- Data Acquisition andDuplication
- Defeating Anti-forensicsTechniques
- Operating SystemForensics
- NetworkForensics
- Investigating WebAttacks
- DatabaseForensics
- CloudForensics
- MalwareForensics
- Investigating EmailCrimes
- MobileForensics
- Forensics Report Writing andPresentation
In-depth Advanced Networking
- Understanding Networks and their Building Blocks
- IP Addressing and Subnets
- Introduction to Cisco Routers, Switches and IOS
- Introduction to IP Routing
- Routing Protocols
- Switching and Spanning Tree Protocol
- VLANs and VTP
- Access Lists
- Network Address Translation (NAT)
- Wide Area Networks
- IPv6
- Virtual Private Networks
- IP Services
- QoS & Security
Top Critical Web Application Vulnerability Certification(DWAV20)
- Injection
- Broken Authentication and Session Management
- Sensitive Data Exposure
- XML External Entity (XXE)
- Broken Access control
- Security Misconfiguration
- Cross-Site Scripting (XSS)
- Insecure deserialisation
- Using Components with Known Vulnerability
- Insufficient logging and Monitoring