Information Security and Ethical Hacking Training

Phase 2

Duration : 40 Hours

Register
  • Network Security Analysis & Scanning
  • Enumeration of Services
  • Scanning & Swiss Army Knife
  • Shell Scripting
  • Metasploit Framework
  • Welcome to Exploitation
  • Playing with Payloads & Exploitation
  • Exploitation & Post-Exploitation
  • Other Exploitations and Frameworks
  • CMS Exploitation - WordPress
  • Memory Management
  • Reverse Engineering - I
  • Reverse Engineering - II
  • Introduction to Buffer Overflow
  • Remote Buffer Overflow
  • Network Traffic Analysis
  • Intrusion Detection/Prevention With SNORT & Log Analysis
  • System Hardening
  • All About Pentesting
  • Automated Tools & Playing With Reports