0% found this document useful (0 votes)
246 views

Ethical Hacking PDF

This self-paced online training course provides foundational knowledge and techniques related to cyber security and ethical hacking. The course teaches fundamental concepts through supplemental video demonstrations and hands-on applications. Key topics covered include common attacks, digital forensics, web application testing, and malware analysis. The target audience includes law enforcement, security professionals, and students seeking to learn ethical hacking skills. The training takes place over 6 days and 12 modules, covering topics such as OWASP vulnerabilities, intercepting HTTP traffic, cross-site scripting, identification and directory traversal attacks, malware reversing, and live penetration testing.

Uploaded by

Krishna Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
246 views

Ethical Hacking PDF

This self-paced online training course provides foundational knowledge and techniques related to cyber security and ethical hacking. The course teaches fundamental concepts through supplemental video demonstrations and hands-on applications. Key topics covered include common attacks, digital forensics, web application testing, and malware analysis. The target audience includes law enforcement, security professionals, and students seeking to learn ethical hacking skills. The training takes place over 6 days and 12 modules, covering topics such as OWASP vulnerabilities, intercepting HTTP traffic, cross-site scripting, identification and directory traversal attacks, malware reversing, and live penetration testing.

Uploaded by

Krishna Sharma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

VAPT/WAPT

ONLINE TRAINING

COURSE DESCRIPTION & GOALS

This course is self-paced training course that provides you with the
necessary knowledge and techniques to assist in cases related to
Cyber security & hacking.
Krishna Sharma
Founder & Ethical Hacker In this hands-on course we provide the learner with foundational
Cyberator Technologies Pvt. Ltd. materials and concepts, supplemental video demonstrations, as well
www.cyberator.in as the opportunity to apply and test the acquired knowledge in real
world. Through this method of instruction, you will learn:
[Your Address]
[City, ST ZIP Code]
 The fundamentals of ethical hacking & cyber security.
Offc 1 & 2, Mansarovar Plaza,  How to perform most trending attacks that are done by the hackers.
Ramnagar, Sabarmati, Ahmedabad  Counter-measures against the most commonly used cyber-attacks.
 The fundamentals of digital forensics and how to perform a detailed
digital investigation.
+91-9560235304  Performing real time attacks on web applications and web servers.

WHO SHOULD TAKE THIS COURSE?


[email protected]
This training course is primarily intended for Ethical hackers, Cyber
security researchers, and Threat Hunters.
FEE: INR 1300 per Student
The target audience for this course is:

 Law enforcement agencies


 Ethical hackers
 Security professionals
 Incident Responders and Threat Hunters
 Cyber security Instructors and students
 Red team members
MODULES

DAY 1:
The fundamentals of ethical hacking & cyber security.
OWASP Top 10 attacks overview.
Identifying a BUG.

DAY 2:
How to perform most trending attacks that are done by the hackers.
Installing and Configuring Burp Suite (Intercepting HTTP and HTTPS)
Configuring Burp for android device.
Practical Demonstration of CORS Attack.

DAY 3:
XSS and its types
Performing live practical on the following using Burp suite-
- Reflected XSS
- Stored XSS
- DOM XSS

DAY 4:
Practical implementation of IDOR Vulnerability using Burp Suite
Theory of IDOR
Theory of DTA
Practical implementation of DTA in Burp Suite

DAY 5:
Malware Reversing theory
Practical implementation
Types of malware
Research on File-less malware

DAY 6:
Live penetration testing
Bug-Bounty demonstration
Q&A Sessions

Fee: INR 1300 per Student

You might also like