Cyber security and Cyber Forensic training

Cyber security and Cyber Forensic Training

Cyber security Classroom and Online Training

Training Mode: One to One online Training and classroom training

Things You Need To Stay Safe Online

Hackers, crackers and cyber criminals

Malware, viruses, rootkits and RATs

The Importance of Patching

Firefox – Browser and extension updates

Chrome – Browser and extension updates

Behavioural Security Controls Against Social Threats (Phishing, Spam)

Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)

Linux basics with installation (GUI and CLI)

Network setup in Linux

Linux File systems

Fake File Creation

Disk dumping Disk zeroing and Null Disk

Partition Management

Package Management

Remote Login Program

IP Based security

Network based security

Time Based security

Load based Security

Connection Based Security

Port based security

Malware Detection in Linux

Audit Linux server or Linux Machine

Firewall configuration and Firewall security

information gathering Techniques

Social engineering – Scams, cons, tricks and fraud

social engineering and Web Assessment

Social Engineering and Social Media Offence and Defence

Harvesting company emails

DNS Enumeration for penetration testing

MAIL Server Enumeration for Penetration Testing

DNSLOOKUP Utility for penetration Testers

Web Application and Its security through Firewall

HTTP and DNS Load Balancer Detection


Create word list for hacking

Network Scanning

Network Enumeration

Password Cracking

Password Bypass

Windows security

Linux security

Data Mining

Web Application Scanning

CMS Attacks

WordPress hacking

Drupal CMS Hacking

Cryptography Introduction

Types of Cryptography

Private key and Public Key

Types of private key

Create Encrypted private key

Decrypt Encrypted Private Key


Hashing Algorithm



Vim security /File security /File Encryption

gpg encryption

Compression decompression

zip security for files and Folders

openssl technology and it’s algorithms

Cryptographic Analysis

Password Algorithms

Disk Encryption

Password Attacks

Password storage Techniques

Metasploit basics

Spyware Rootkits and key Loggers Detection and removal

Malware Analysis and detection

Antivirus configuration in Linux

Dos Attacks


Web Testing Tools

Password Attacks on Web sites

Steganography lab with examples an usage in Linux

Steganography lab with examples an usage in Windows

Using Proxies

Banner Grabbing using all possible methods

IP and Gateway

Opensource/freeware Firewalls configuration for securing servers

Real time Process monitoring

Linux Auditing

Loop Devices and its usage with benefits and configuration

File system upgrade and degrade with data loss

File system upgrade and degrade without any data loss

Fping a command line tool for network troubleshooting

rootkit scanning for rootkits,back doors and local exploit

AVG Antivirus in Linux Server

AVG Installation, configuration and update in Linux

Domain Information Groper(DIG)

name Server Lookup(NSLOOKUP)

Increasing Time interval between Packets

Specify number of packets to be sent to any machine.

View ping statistics

Record and print the route of ping

Stop your system from responding to ping

Stop your Router from responding to ping

Linux Fork Bomb

Proxy and Telnet a remote Login Program complete lab

create your own Password dictionary

Brute force Telnet using Metasploit

Brute force ssh using Metasploit

Brute force FTP using Metasploit

Brute force HTTP using Metasploit

Brute force attack framework for Social networking sites like Facebook,gmail,instagram,twitter etc

Check SSl vulnerablity

Service scanning with Metasploit

SMB Scanning with Metasploit

Hack WordPress using Metasploit

Remote Machine OS Detection using Metasploit

Remote Machine HOSTS Detection using Metasploit

Remote Machine services Detection using Metasploit

Introduction to DoS

DoS vs DDoS

Levels of Ddos Attacks

Preventing DDoS Attacks

Generating payloads

Generating payloads continued

Physical Security

Physical Security Concepts

Single User Mode Security

Single User Mode and Blank Passwords

Securing the Boot Loader

Disk Encryption

File Attributes

File Attributes Demo


ACLs Demo


Rootkit Hunter Demonstration

Rootkit Detection Software

Understand The Difference Between The Clear Web And Deep Web

Difference Between The Dark Web And Deep Web

Misconceptions And Myths About The Deep Web

Precautions Needed To Be Taken When Browsing The Deep Web

How To Access The Deep Web On Android

How To Find Deep Web Links And Websites

How To Set-Up And Use Email On The Deep Web

How To Use Deep Web Search Engines

Configure Tor With a VPN

cyber security training



cyber security training