Students & Members/Admin Login Area -->

Cancel
Certified Professional Hacker Course
Course Duration: 42 HrsIT Training

KnowledgeTech, an established IT Training, Service Provider & Web Development Firm in Powai believes in empowerment of education through Complete IT based Solutions. We represent a brand that acknowledges and delivers education & all IT based requirements & services with excellence.

For the First time in Powai, in alliance with SecMagus we bring to you a career trend course in Ethical Hacking - (Certified Professional Hacker).

It is a course that suffices all the present requirement of the current IT Industry which longs for Security.

Course Curriculum
  • Section 1 : Introduction & Overview

    TCP/IP Fundamentals

    Operating System Fundamentals

    Web Application & Database Fundamentals

    Introduction to Ethical Hacking

    Advanced Persistent Threats

    Steps to proceed in Ethical Hacking Nmap Concepts & Flags

  • Section 2 : Introduction to OS Fundamentals & Security

    Windows Security:-

    Attacking windows system information

    Physical security

    Securities Policies

    User rights authorities

    Windows System Security

    Linux Security :-

    User & Group

    User & Group Security

    File System Security

    Unix Network Security

    Linux Security

    Operating System Security

  • Section 3: Network Security

    Footprinting

    Advanced Google Hacking

    Nmapping the network

    Port Scanning

    Fingerprinting

    Secure Network Design

    DMZ

    VLANs

    Firewall

    IDS/IPS

    WLAN security

    VPNs

    Telecommunication

    Types and Sources of Network Threats

  • Section 4 : Web Application Security

    Web Application Security Concepts

    OWASP Top 10 vulnerabilities

    Injections Flaws

    XSS (Cross Site Scripting)

    Broken Authentication and session management

    Cross Site Requst Frogery (CSRF)

    Security Mis-configuration

    Insecure Cryptographic Storage

    Failure to Restrict URL Access

    Insufficient TransportLayer Protection

    Unvalidated Redirects and Forwards

  • Section 5: Metaploit & Social Engineering

    Metasploit

    Social Engineering

    What is Social Engineering

    Common Types of Attacks

    Online Social Engineering

  • Section 6: Real Time Hacking

    Web-Shell Upload

    Pass-The-Hash

    Token Impersonation

    Xp_cmd shell

    BlindSQL version enumeration

    LFI to RCE attacks


galleria

A word on SecMagus, through their eyes...

SecMagus established in 2012, is totally committed to providing high end security solution services to private and public enterprises across the globe thereby enabling them to protect their critical data. We at SecMagus believe in providing high end security solutions with simple but continuous process.

SecMagus has a group of highly qualified individuals with impeccable and varied knowledge in the field of security solutions. Our professionals are extensively trained and certified in CEH , ECSA , LPT ,CPFA , CISC ,CPH, ISO 9001 la , ISO 27001, ISMS , CISA , ITIL and CISM.

SecMagus has the ability to provide complete security and auditing services across all sectors of the industry which helps in actively monitoring, reducing and preventing risks 24/7 or round the clock.