Certified Ethical Hacker
Certification will fortify the application knowledge of security officers,
auditors, security professionals, site administrators, and anyone who is
concerned about the integrity of the network infrastructure. CEH students will
be immersed into an interactive network hacking environment where they will be
shown how to scan, test, hack and secure their own systems. Students will begin
by understanding how perimeter defenses work and then be lead into scanning and
attacking their own networks. CEH students then learn how intruders escalate
privileges and what steps can be taken to secure a system. Students will also
learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS
Attacks, Buffer Overflows and Virus Creation. Learn the art of penetration
testing (pen testing) in order to create a network intrusion vulnerability
Windows Exploit Development course is a hands-on course on
writing exploits. Students will receiving an introduction to x86 architecture
as it relates to writing exploits. Hands-on work includes, building a fuzzer, writing
proof of concept exploits and then improving on the developed exploits to
case studies covered include public vulnerabilities that will be exploited
using various techniques. While this is an entry level exploit development,
students are expected to have a basic understanding of networking concepts.
It's also useful (but not required) that students have a basic understanding of
the Linux command line.
This is an all new
moderate to advanced level class, for those inquisitive to dive further into
the workmanship and specialty of exploitation. Majority of the course will be
concentrating on bug classes and vulnerabilities which are applicable today, on
programs and PDF readers. The focus of this class is to get students up to
speed with memory defilement strategies, for example, stack overflows,
exception handler abuse, in-memory question debasement, vtable overwrites and
abusing use after free bugs.
Fundamentals of Cyber Security
Dive into the world of Cyber Security where you will learn
the fundamental practices and protocols for information assurance (IA).
Students shall review their networking basics, understand network devices
including IDS/IPS and firewalls, and learn how to properly implement network
security devices. Students will also perform lab assignments representing real
world scenarios to ensure full understanding of topics and concepts. At the end
of this class students should be able to demonstrate the capability to plan an
Information Security Policy and carry out defensive network techniques to
ensure the minimum security risk to their organization.
This course fills in as a guide for training understudies on
the most proficient method to dissect malware once found inside a Windows
working framework. Since malicious programming assumes a part in practically
every security episode or PC interruption, the information and abilities
accomplished through this class demonstrate valuable to people trying to
progress inside the malware expert calling.
While this course concentrates on Windows working
frameworks, the aptitudes adapted effortlessly exchange to other working
We have joined our insight into the innards of the Metasploit Framework and Adversarial Red Teaming to present a standout amongst the most serious classes on assaulting systems. Scope on everything from hacking up your own particular modules to owning an entire systems administration without drawing a solitary drop of support flood blood. This surgical strike upon your frontal projection will abandon you shrieking ruby and spurting root shellz from your veins
Mobile Application Hacking & Security
This course will focus on the techniques and tools for testing the security of Android and iOS mobile applications. During this course, the students will learn about important topics such as the Android and iOS Security model, the emulator, how to perform static analysis, traffic manipulation, and dynamic analysis. By taking this course, you will be able to perform penetration testing on Android and iOS mobile applications and expose potential vulnerabilities in the tested application.
This Course is designed for network administrators and
security professionals who want to take a serious and meaningful step into the
world of professional penetration testing. This unique penetration testing
training course introduces students to the latest ethical hacking tools and
techniques, including remote, virtual penetration testing labs for practicing
the course materials.
Security Awareness Training
A practical 3 day course overview of the major to minor
pillars that support the foundation of information systems security in an
awareness approach of conveying the message through the mind of the attacker
Penetration testing often focuses on individual
vulnerabilities and services, but the quickest ways to exploit are often hands
on and with unique techniques. This four-day course introduces a tactical
approach that does not rely on exploiting known vulnerabilities. Using a
combination of new tools and lesser-known techniques, attendees will learn how
hackers compromise systems without depending on standard exploits. The class
alternates between lectures and hands-on testing, providing attendees with an
opportunity to try the techniques discussed.