Cyber Security Online Training
Linux Basics Required For penetration Testing
Windows Basics Required for Penetration Testing
Networking Basics: Like IP,subnet mask,class,Router,switch,Nat,Bridge etc
Penetration Testing Complete Lab setup using Virtualization/VMware/VirtualBox
User and Group management in Linux Server
File and Folder management
Permission management
Package management
Web server Configuration in Linux
yum server configuration in Linux
chat server in linux
telnet server in Linux
ftp and ssh server in Linux
proxy server configuration in Linux
python as web server in Linux
secure telnet server in linux
Web Proxy Lab in Linux
Web Authentication Lab Linux
Everything as HTTP in Windows7/8/10
HTTP server lab for penetration testing with Authentication
FTP server lab setup with Authentication
HTTP port based security
FTP port based security
Telnet and SSH Server setup with Password protection
Telnet Proxy lab
Proxychain Configuration Lab
SSH Control
Disable SSH root user login
Limit Users’ ssh access
AllowUsers in ssh
DenyUsers in ssh
Disable Empty Passwords
Use TCP wrappers for ssh
Enable a warning banner for ssh users
SSH Server Best Security Practices : Learn to secure OpenSSH with example Lab | Cyber Security Lab
Web Server Lab Setup for Penetration Testing
Payload creation and exploiting android device.
Netcat tools usage
banner Grabbing
Understanding Encoding
Brute Force Website Login Page
Hack the Basic HTTP Authentication using Burpsuite or Hydra
Ways to Directory Bruteforcing on Web Server
Understanding Redirection with Hashing and Crypto Salt
Understanding Redirection with Encoding Techniques
ways to Brute Force Attack on WordPress Website
Penetration Testing in WordPress Website using Wpscan
Port Scanning using Nmap
IP and Network Scanning
DNS Footprinting
DNS Enumeration
Network setup in Linux
Linux File systems
Fake File Creation
Disk dumping Disk zeroing and Null Disk
Partition Management
Package Management
Remote Login Program
IP Based security
Network based security
Time Based security
Load based Security
Connection Based Security
Port based security
Malware Detection in Linux
Audit Linux server or Linux Machine
Firewall configuration and Firewall security
information gathering Techniques
Social engineering – Scams, cons, tricks and fraud
social engineering and Web Assessment
Hacking Facebook using Social Engineering
Hacking Gmail using Social Engineering
information gathering using Dmitry tool
information gathering using netdiscover
information gathering using Sparta
Password Attacking through Hydra
Password Attacking through Medusa
Password Attacking through John
Create own dictionary using Crunch
Malware Detection and prevention
complete System Audit and Report generation
Antivirus Setup and Scanning on Linux Servers
Rootkits Scanning and Testing
gpg encryption with gpgsplit complete Lab
Creating a Workspace …………………………………………………………………
Database Nmap Scan …………………………………………………………………..
Hosts Database……………………………………………………………………………
Services Database ……………………………………………………………………….
Vulnerabilities Database …………………………………………………………….
Credentials Database …………………………………………………………………
Renaming Workspace ………………………………………………………………..
Deleting a Workspace ……………………………………………………………….
Verbose Details of Workspaces ………………………………………………….
Exporting Workspace ………………………………………………………………..
Deleting all Workspaces………………………………………………….
Importing Hosts………………………………………………………………
Listing Hosts in Database ……………………………………………………
Adding Hosts ………………………………………………………………
Deleting a host ……………………………………………………………….
Exporting Hosts Database …………………………………………………………..
Search and Tag Hosts ……………………………………………………………..
Filter Search……………………………………………………………………
Deleting Services of a Host…………………………………………………………
Filter Search…………………………………………………………………..
Port Specific Services……………………………………………………………
Exporting Services Database ………………………………………………………
Search Services………………………………………………………………….
Port Specific Vulnerabilities……………………………………………………
Service Specific Vulnerabilities ………………………………………………..
Host Specific Vulnerabilities………………………………………………….
Exporting Vulnerabilities Database………………………………………………
Loot Database ………………………………………………………………………….
Search Loot……………………………………………………………………….
Type Specific Loot……………………………………………………………………..
Deleting Loot……………………………………………………………………………
Metasploit Framework for scanning services
Metasploit Framework for Exploiting services
Metasploit Framework for exploring open port and other information
DOS Attack’s Testing Lab/Live Demonstration
Webcam Hacking Lab
Firewall configuration, setup and usage with example labs.
Firewall Testing
Testing Web Application Firewall
Load Balancing Detector
Information gathering, Network scanning, port scanning, Service Scanning using Metasploit Framework and other tools.
ping attack/FPS in gaming
Physical Theft
Abuse of Privileges
Unauthorized Access by Outsider
Malware infection
Intrusion detection and Prevention Techniques
Anti-Malware software
Network based Intrusion detection Systems
Network based Intrusion Prevention Systems
Host based Intrusion prevention Systems
Security Information Management
Network Session Analysis
System Integrity Validation.
Mariyam Kali Linux Tool
what is OWASP maryam
OSINT Modules
maryam framework startup
create workspace
set framework options
dnsbrute tool
crwal_pages tutorials
search modules
searx
quora
Username_serach
document_search
tweet search
document search
Linux File systems
Fake File Creation
Disk dumping Disk zeroing and Null Disk
Partition Management
Package Management
Remote Login Program
IP Based security
Network based security
Time Based security
Load based Security
Connection Based Security
Port based security
Malware Detection in Linux
Audit Linux server or Linux Machine
Firewall configuration and Firewall security
information gathering Techniques
Social engineering – Scams, cons, tricks and fraud
social engineering and Web Assessment
Hacking Facebook using Social Engineering
Hacking Gmail using Social Engineering
information gathering using Dmitry tool
information gathering using netdiscover
information gathering using Sparta
Password Attacking through Hydra
Password Attacking through Medusa
Password Attacking through John
Create own dictionary using Crunch
Malware Detection and prevention
complete System Audit and Report generation
Antivirus Setup and Scanning on Linux Servers
Rootkits Scanning and Testing
gpg encryption with gpgsplit complete Lab
Metasploit Framework for scanning services
Metasploit Framework for Exploiting services
Metasploit Framework for exploring open port and other information
DOS Attack’s Testing Lab/Live Demonstration
Webcam Hacking Lab
Firewall configuration, setup and usage with example labs.
Iptables configuration
Iptables services
ACL syntax for iptables
Iptables basic commands
Appending/Inserting rules
Replace rules for firewall
Firewall Backup and Restoring rules using Iptables
flush all chains PREROUTING FORWARD INPUT OUTPUT POSTROUTING
zero counters in Firewall
erase user created chains
allow icmp or ping protocol
open ssh port using Firewall
VNC client port using Frewall
Webserver:create rules to allow all traffic on port 80 and 443.
multiport allow or deny using Firewall
MAC address level filtering
Iptables log
allow Samba in iptables
configure NFS services to use fixed ports.
configure firewall to allow nfs traffic
Firewall Testing
Testing Web Application Firewall
Load Balancing Detector
Information gathering, Network scanning, port scanning, Service Scanning using Metasploit Framework and other tools.
ping attack/FPS in gaming
Physical Theft
Abuse of Privileges
Unauthorized Access by Outsider
Malware infection
Intrusion detection and Prevention Techniques
Anti-Malware software
Network based Intrusion detection Systems
Network based Intrusion Prevention Systems
Host based Intrusion prevention Systems
Security Information Management
Network Session Analysis
System Integrity Validation.
You may be also interested in
Register for FREE Demo
Fields marked with (*) are mandatory
Client Feedback
Thanks, you guys provided the best online training in SAP BODS. The hands on training is very informative and helpful.
- David Sergi, Camaga Ltd; U.K