Cyber security and Cyber Forensic training

Cyber security and Cyber Forensic Training available.

Training Mode: One to One online Training and classroom training

Linux basics with installation (GUI and CLI)

Network setup in Linux

Linux File systems

Fake File Creation

Disk dumping Disk zeroing and Null Disk

Partition Management

Package Management

Remote Login Program

IP Based security

Network based security

Time Based security

Load based Security

Connection Based Security

Port based security

Malware Detection in Linux

Audit Linux server or Linux Machine

Firewall configuration and Firewall security

information gathering Techniques

social engineering and Web Assesment

Harvesting company emails

DNS Enumeration for penetration testing

MAIL Server Enumeration for Penetration Testing

DNSLOOKUP Utility for penetration Testers

Web Application and Its security through Firewall

HTTP and DNS Load Balancer Detection


Create word list for hacking

Network Scanning

Network Enumeration

Password Cracking

Password Bypass

Windows security

Linux security

Data Mining

Web Application Scanning

CMS Attacks

WordPress hacking

Drupal CMS Hacking

Cryptography Introduction

Types of Cryptography

Private key and Public Key


Hashing Algorithm



Vim security /File security /File Encryption

gpg encryption

Compression decompression

zip security for files and Folders

openssl technology and it’s algorithms

Cryptographic Analysis

Password Algorithms

Disk Encryption

Password Attacks

Password storage Techniques

Metasploit basics

Spyware Rootkits and key Loggers Detection and removal

Malware Analysis and detection

Antivirus configuration in Linux

Dos Attacks


Web Testing Tools

Password Attacks on Web sites


Using Proxies

Banner Grabbing

IP and Gateway

Opensource/freeware Firewalls configuration for securing servers

Real time Process monitoring

Linux Auditing

Loop Devices and its usage with benefits and configuration

File system upgrade and degrade with data loss

File system upgrade and degrade without any data loss

Fping a command line tool for network troubleshooting

rootkit scanning for rootkits,back doors and local exploit

AVG Antivirus in Linux Server

AVG Installation, configuration and update in Linux

Domain Information Groper(DIG)

name Server Lookup(NSLOOKUP)

Increasing Time interval between Packets

Specify number of packets to be sent to any machine.

View ping statistics

Record and print the route of ping

Stop your system from responding to ping

Stop your Router from responding to ping

Linux Fork Bomb

Proxy and Telnet a remote Login Program complete lab