ELITE CYBER SECURITY TRAINING

INDUSTRY LEADERS ARE AFRAID YOU’LL BEAT THEM AT THEIR OWN GAME

video
FAST FORWARD YOUR CAREER BY LEARNING ONLY FROM REAL HACKERS
ASSURED PLACEMENT OR PAID INTERNSHIPS ON COMPLETION
FOCUS ON TODAY'S CORPORATE REQUIREMENTS
DEVELOP MANUAL PENTESTING SKILLS UNLIKE YOUR PEERS
REWARDS AND RECOGNITION FROM PROFESSIONAL HACKATHONS
ACCESS PASS TO A SUCCESSFUL ECOSYSTEM

OUR COURSES

(Duration - 30 Hours)

  • Installation of Kali linux
  • Basic Commands of Kali Linux
  • Network Fundamentals
    TCP/IP
    Firewall /IDS/IPS/DMZ
    Proxy/ VPN
    IP addressing and MAC Address
  • Wireless Hacking
    Understanding 802.11 History
    Different Operating modes
    Wireless Frames
    Authentication in wep/wpa2
    Cracking wpa/wpa2
    Aircrack-ng
  • Information Gathering
    NSlookup
    Banner grabbing
    OS detection
    Port scanning
    Service Scanning
    Recon-ng
    Maltego
  • Web Fundamentals
    HTTP methods
    OWASP Top 10
    Sql Injection
    Cross site scripting
    Command Injection
    Wordpress scanning
  • System hacking
    Password Cracking
  • Android hacking
    Architechture
    Using Metasploit
  • IoT
    Firmware Analysis
  • Basics of Cryptography
  • Steganography
  • Introduction to HID attacks
  • Basics of Social Engineering
  • Tools of Trade
    Burp suite
    Metasploit/Armitage
    Nmap/zenmap
    WireShark
  • Introduction to BASH scripting
    Scenario I
    Scenario II

(Duration - 30 Hours)

  • Understanding TCP/IP
    Packet Crafting
    Google Hacking
  • Kali Linux Utilities
    Netdiscover
    Nc
    Ping
    Arp
    Dig
    Traceroute
    Netcat
  • Reconnaissance
  • HTTP Methods Overview
    HTTP Verb Tampering
  • Vulnerability Scanning
    Nessus
    Nikto
    WPScan
  • Server Side Testing
    SSRF
    IDOR
    Tow-Factor Authentication Bypass Techniques
          • Injection Attacks
            HTML Injection
            Command injection
            Sql Injection
            Blind Sql
            Error-Based
            Null byte injection
            Template injection
          • MITM Attacks
            MITM Framework
            ARP Poisioning
            MITM Proxy
          • XSS Attacks
            Reflected
            Persistence
            DOM
          • CSRF Attack
          • LFI AND RFI Attack
          • Open-Redirection Methods
  • Advance Wifi Hacking
    WPS Attack
    WPA/WPA2(Dictionary Attack)
    WEP Hacking
    Securing WiFi
    Speeding Up WPA2 Attack
    Rogue Access Point
    Router Firmware Analysis & Modification
  • Understanding Burpsuite
    Analyzing Request & Response
    Tampering Request & Response
  • Metasploit Framework
    Scanning
    System Hacking
    POST Exploitation
    Detecting Meterpreter Payloads
  • Buffer Overflow Exploitation (BoF)
    Crashing Program
    Overwriting Adjacent Memory
    Format String Vulnerability
  • Basics of Shell Coding

SPECIALIZED COURSES

(Duration - 16 Hours)

Description:
This course focuses on the basics of 32-bit assembly language on the Linux platform. Once we are through with the basics, we will look at writing shellcode.

  • Module 1
    Intro
    Tools of Trade
  • Module 2
    System Organisation
    Virtual Memory Organisation
    The Stack
    Sample program
    Creating a simple Program
    Debugging the program
    Moving Data
    Controlling Execution Flow
    Using Numbers
    Working with Strings
    Working with Functions
    Linux system calls
  • Module 3
    Introduction to shellcoding
    Basic shellcoding
    Writing your first shellcode

(Duration - 30 Hours)

Description:
Shellcodes play a vital role in cyber security field, they are widely used in a lot of malware and exploits.Though there are a lot of open source shellcodes on internet, but for exploiting new and different vulnerabilities every cyber security researcher should be able to write their own sophisticated shellcode. In this course, we will start from assembly language code and then start with generating the shellcode.

  • Module 1
    Basic Assembly
    System organisation
    Virtual Memory Organisation
    Debugging
    Simple Hello world
  • Module 2
    Introduction to Exploitation
    Basic Concept
    Buffer Overflow
    Buffer overflow on Linux
    Buffer overflow on windows
    Shellcode
    Introduction to Format string
  • Module 3
    Real world exploitation
    Scenario-1
    Scenario-2

(Duration - 16 Hours)

Pre-requisites:
Basic knowledge of programming fundamentals.
Basic knowledge of programming languages such as Java

Description:
Mobile security and penetration testing is a relatively new field. There are aspects of this field that are deeply overlooked, even by many advanced and progressive organizations. In this course, we will teach you how to find the vulnerabilities and to exploit them. Start from the very basics, all the way to advanced exploitation.

  • Module 1
    Introduction
    Android Architectures
    Setting up a Testing Environment
    Installing & setting up IDE’s
    OWASP Mobile Top 10
  • Module 2
    Android Build Process
    Android studios
  • Module 3
    Device Rooting
    Rooting
    Unrooting
  • Module 4
    Android Application Fundamentals
    Components of Android
    Activity
    Service
    Broadcast receivers
    Content providers
  • Module 5
    Network Traffic
    Setting Up Proxy  for Burp Suit
  • Module 6
    Static Analysis
    ADB
    Drozer
    Apktool
  • Module 7
    Reversing APKs
    Code analysis

Next steps towards your training and internship is for us to get to know you better and guide you based on your UNIQUENESS:

September 2019, Mumbai batches: Kindly note the Foundation courses are open to all passionate and bright applicants.

However, due to a massive increase in applications, the specialized courses require applicants to pass a practical cyber security assessment.

FAQ

We have two training platforms with limited seats:

LIVE online classes OR our offices and centers in Mumbai

To sign up, fill in the application form or reach out to us via the chat box – we will first get to know you and your skills / interests in technology and security. After which, we will guide you on using your skills and our experience to stand out from the crowd.

The primary reason our team ventured into training was to develop talent that we can work with in the long run. We also refer successful pass outs to our clients when their requirements arise. Over time this has been evolving and we are now assisting students, aspirants, and professionals across several verticals.

If you refer your friends the course to join:

  1. You can stand a chance to win exciting cash prizes or pentesting hardware
    OR
  2. You can get a discount on your training fees
    OR
  3. An ultra elite hacking training demonstration or talk by our team members who penetrated one of the worlds most sensitive systems

Your choice

Cyber security is not easy and real life cyber threats will never give you hint. However, please tell us you’d already checked the source code of this page? Is there more?

Talent knows no age! You could be a young aspirant or an experienced IT professional. We are here to add value to your career.

Essentials:
1. Please carry your own laptop with over 10 GB of available storage
2. Dress code to be followed is formals or smart casuals

The training will be conducted around Fort, Mumbai. Depending on the modules and training, the location may differ between our offices. The nearest train stations are CST and Churchgate.

Yes, a non-technical background person can join, provided you’re passionate about technology and are willing to go the extra mile. Competency in Internet, mobile, and computer functions is mandatory.

We will attempt to give you an extra class, subject to availability. Our team is friendly and will attempt to help you catch up. However, due to the intricate and practical nature of the training, we cannot make any guarantees if a class is missed.

Disclaimer: Accepted students agree to use their training only for ethical and academic purposes. CYBERNETIV DIGITAL will not be held responsible for any malicious or unethical usage of the skills imparted.

Do NOT follow this link unless you are feeling adventurous or like reading our quirky messages! Consider yourself warned, you will be blocked