Ethical Hacking PDF
Ethical Hacking PDF
ONLINE TRAINING
This course is self-paced training course that provides you with the
necessary knowledge and techniques to assist in cases related to
Cyber security & hacking.
Krishna Sharma
Founder & Ethical Hacker In this hands-on course we provide the learner with foundational
Cyberator Technologies Pvt. Ltd. materials and concepts, supplemental video demonstrations, as well
www.cyberator.in as the opportunity to apply and test the acquired knowledge in real
world. Through this method of instruction, you will learn:
[Your Address]
[City, ST ZIP Code]
The fundamentals of ethical hacking & cyber security.
Offc 1 & 2, Mansarovar Plaza, How to perform most trending attacks that are done by the hackers.
Ramnagar, Sabarmati, Ahmedabad Counter-measures against the most commonly used cyber-attacks.
The fundamentals of digital forensics and how to perform a detailed
digital investigation.
+91-9560235304 Performing real time attacks on web applications and web servers.
DAY 1:
The fundamentals of ethical hacking & cyber security.
OWASP Top 10 attacks overview.
Identifying a BUG.
DAY 2:
How to perform most trending attacks that are done by the hackers.
Installing and Configuring Burp Suite (Intercepting HTTP and HTTPS)
Configuring Burp for android device.
Practical Demonstration of CORS Attack.
DAY 3:
XSS and its types
Performing live practical on the following using Burp suite-
- Reflected XSS
- Stored XSS
- DOM XSS
DAY 4:
Practical implementation of IDOR Vulnerability using Burp Suite
Theory of IDOR
Theory of DTA
Practical implementation of DTA in Burp Suite
DAY 5:
Malware Reversing theory
Practical implementation
Types of malware
Research on File-less malware
DAY 6:
Live penetration testing
Bug-Bounty demonstration
Q&A Sessions