Advanced Diploma Course Content

In this Diploma Course, we can provide the high quality Training for intermediate students who prepare for advance hacking skills in the cyber security field.

Download SyllabusApply Now

4 Advanced Levels

  • MODULE 1 :- xss
  • MODULE 2 :- Host header
  • MODULE 3 :- Url redirection
  • MODULE 4 :- Command injection
  • MODULE 5 :- Critical file found
  • MODULE 6 :- FIle inclusion
  • MODULE 7 :- Source code disclosure
  • MODULE 8 :- File upload
  • MODULE 9 :- Parameter tampering
  • MODULE 10 :- Spf
  • MODULE 11 :- SQL
  • MODULE 12 :- No rate limiting
  • MODULE 13 :- Long password dos
  • MODULE 14 :- IDOR
  • MODULE 15 :- Joomla security vulnerabilities
  • MODULE 16 :- Account lockout
  • MODULE 17 :- Apache http server byte range DOS
  • MODULE 18 :- Apache struts RCE Hunting
  • MODULE 19 :- Application server vulnerabilities
  • MODULE 20 :- Authentication testing
  • MODULE 21 :- Blind XSS
  • MODULE 22 :- Buffer overflow
  • MODULE 23 :- CMS hunting
  • MODULE 24 :- Compherensive Command injection
  • MODULE 25 :- Cryptographic vulnerabilities
  • MODULE 26 :- CSRF
  • MODULE 27 :- Drupal Security Vulnerabilities
  • MODULE 28 :- Account takeover through support service
  • MODULE 29 :- Exposed Source Control
  • MODULE 30 :- Extraction information and geo location through uploaded images
  • MODULE 31 :- Heartbleed
  • MODULE 32 :- HSTS
  • MODULE 33 :- HTTPOXY Attack
  • MODULE 34 :- Identity Management Testing
  • MODULE 35 :- Advanced Indirect object refrence
  • MODULE 36 :- Multi Factor Authentication (2FA) Security Testing
  • MODULE 37 :- Password Reset poisoning
  • MODULE 38 :- Server side injection (SSI)
  • MODULE 39 :- Session fixiation
  • MODULE 40 :- Shell Shock RCE testing
  • MODULE 41 :- SSRF
  • MODULE 42 :- Testing For Session Management
  • MODULE 43 :- Ticket Security testing
  • MODULE 44 :- Web cache deception Attack
  • MODULE 45 :- Webmin unauthentic RCE
  • MODULE 46 :- WordPress Security testing
  • MODULE 47 :- Application Logic Vulnerabilities
  • MODULE 48 :- Broken AUthentication
  • MODULE 49 :- Browser cache weakness
  • MODULE 50 :- cache testing
  • MODULE 51 :- CAPTCHA Security testing
  • MODULE 52 :- Code injection
  • MODULE 53 :- Cookies testing
  • MODULE 54 :- CORS
  • MODULE 55 :- CRLF injection
  • MODULE 56 :- CSS injection
  • MODULE 57 :- DANGEROUS http methods
  • MODULE 58 :- Testing for default configuration
  • MODULE 59 :- Directory lisitng testing
  • MODULE 60 :- DOM CLOBBERING
  • MODULE 61 :- HTTP PARAMETER POLLUTION
  • MODULE 62 :- Identity management testing
  • MODULE 63 :- LDAP injection
  • MODULE 64 :- LOg injection
  • MODULE 65 :- NULL BYTE INJECTION
  • MODULE 66 :- OAUTH Secruity testing
  • MODULE 67 :- Open redirection
  • MODULE 68 :- Web Application Firewall Testing
  • MODULE 69 :- Parameter Modification testing
  • MODULE 70 :- PHP Object injection
  • MODULE 71 :- RACE condition vulnerability
  • MODULE 72 :- Relative Path Overview
  • MODULE 73 :- Remote Code injection
  • MODULE 74 :- Http Headers testing
  • MODULE 75 :- SSL Security testing
  • MODULE 76 :- SSTI Testing
  • MODULE 77 :- template injection
  • MODULE 78 :- Virutal host Misconfiguration
  • MODULE 79 :- Vulnerable Remember me testing
  • MODULE 80 :- Weak Password reset
  • MODULE 81 :- Web Application Firewall Testing
  • MODULE 82 :- XML QUADRATIC BLOWUP
  • MODULE 83 :- XML RPC pingback
  • MODULE 84 :- XXE injection
  • MODULE 85 :- ADVANCED TRAINING ABOUT BURPSUITE
  • MODULE 1 :- Introduction to Malware Analysis
  • MODULE 2 :- Basic Of Analysis
  • MODULE 3 :- Advanced Static Analysis
  • MODULE 4 :- Analyzing Windows Programs
  • MODULE 5 :- Advanced Dynamic Analysis
  • MODULE 6 :- Malware Behaviour
  • MODULE 7 :- Data Encoding and Malware countermeasues
  • MODULE 8 :- Covert Malware Launching
  • MODULE 9 :- AntiAnalysis
  • MODULE 10 :- Packing and Unpacking
  • MODULE 11 :- Rootkit Techniques
  • MODULE 1 :- The IOT Security testing Overview
  • MODULE 2 :- Case Study: Connected and Self-Driving
  • MODULE 3 :- Vehicles Security
  • MODULE 4 :- Case Study: Microgrids
  • MODULE 5 :- Case Study: Smart City Drone System
  • MODULE 6 :- IOT Hardware and Software
  • MODULE 7 :- Communication and Messaging Protocols
  • MODULE 8 :- IOT Interfaces and Services
  • MODULE 9 :- Threats, Vulnerabilities and Risks
  • MODULE 10 :- Case Study: The Mirai Botnet Opens Up
  • MODULE 11 :- Pandora’s Box
  • MODULE 12 :- Today’s Attack Vector
  • MODULE 13 :- Current IOT Security Regulations
  • MODULE 14 :- Current IOT Privacy Regulations
  • MODULE 15 :- What is Threat Modeling
  • MODULE 16 :- An Introduction to IOT Security Architectures
  • MODULE 17 :- Identifying Assets
  • MODULE 18 :- Creating a System Architecture
  • MODULE 19 :- Documenting Threats
  • MODULE 20 :- Rating Threats
  • MODULE 21 :- IOT Privacy Concerns
  • MODULE 22 :- Privacy By Design (PbD)
  • MODULE 23 :- Conducting a Privacy Impact Assesments

    MODULE 1 :- Introduction

  • Finding Files
  • Services in Kali SSH Service
  • FTP Services
  • HTTP Service
  • Mysql Services
  • Service Management

  • MODULE 2 :- Basic Linux and Commands

  • Locate
  • Which
  • Find
  • Sed
  • Awk
  • Cut
  • Sort
  • Grep
  • Head
  • Tail
  • Wget
  • Cat

  • MODULE 3 :- Netcat Tutorials

  • Getting start with NC
  • Connecting to a Server
  • Fetching HTTP header
  • Chatting
  • Creating a Backdoor
  • Verbose Mode
  • Save Output to Disk

  • MODULE 4 :- Port Scanning

  • TCP Delay Scan
  • UDP Scan
  • Reverse TCP Shell Exploitation
  • Randomize Port
  • File Transfer
  • Reverse Netcat Shell Exploitation
  • Banner grabbing
  • Port Scanning With Nmap & Wireshark
  • TCP Connect Scan with wireshark
  • Network Sweeping with wireshark
  • SYN Scan with wireshark
  • UDP Scan with wireshark
  • FIN Scan with wireshark
  • Null Scan with wireshark
  • OS Discovery with wireshark
  • NSE Scripts with wireshark
  • Nmap Firewall Scan

  • MODULE 5 :- Enumeration

  • Overview
  • DNS Enumeration
  • Forward DNS Lookup
  • Reverse DNS Lookup
  • Zone Transfers
  • NetBIOS & SMB Enumeration
  • Null Sessions
  • Enum4Linux
  • SMB NSE Scripts
  • MSQL Enumeration
  • MSSQL Enumeration
  • SMTP Enumeration
  • VRFY Script
  • Python Port
  • SNMP Enumeration
  • SNMP MiB
  • SNMPWalk

  • MODULE 6 :- Passive Info Gathering

  • Overview
  • Google Search
  • Google Hacking
  • GHDB
  • Directory Bruteforce Attack
  • Dirb
  • Dirbuster
  • Dirsearch
  • Metasploit

  • MODULE 7 :- Reverse Shell

  • Php reverse shell
  • Python reverse shell
  • Perl reverse shell
  • Bash reverse shell
  • Msfvenom shell

  • MODULE 8 :- Intro to Overflows

  • Overview
  • Vulnerable Code
  • Stack Overflow

  • MODULE 9 :- Windows BO Example

  • Overview
  • Fuzzing
  • Crash Replication
  • Controlling EIP
  • Introducing Shellcode
  • Bad Characters
  • Redirecting Execution
  • Introducing Mona
  • Shellcode Payload

  • MODULE 10 :- Linux BO Example

  • Overview
  • Controlling EIP
  • Locating Space
  • First Stage Shellcode
  • Locating RET
  • Generating Shellcod

  • MODULE 11 :- Using Public Exploits

  • Overview
  • Finding Exploits
  • Exploit – DB
  • Fixing Exploits 1
  • Fixing Exploits 2
  • Cross – Compiling

  • MODULE 12 :- File Transfers

  • FTP
  • Python HTTP Server
  • php http server
  • HFS Tool
  • Netcat
  • CURL
  • SMB Server
  • Powershell File Transfer
  • Bitsadmin
  • Wget
  • TFTP
  • Python

  • MODULE 13 :- Linux Privilege Escalation

  • Suid Binaries
  • Absuing Sudo ‘ s Right
  • Kernel Exploit
  • Path Variables
  • Multiple Ways to edit / etc / passwd fill
  • Windows Privilege Escalation
  • Weak File Permissions
  • Always Install Elevated
  • Bypass UAC
  • Kernel Exploits

  • MODULE 14 :- Web Application Attacks

  • Overview
  • Local File Inclusion
  • SQL Injection
  • Authentication Bypass
  • Error Based Enum
  • Blind SQL Injection
  • Attack Proxies
  • SQLMap

  • MODULE 15 :- Password Cracking

  • Overview
  • Crunch
  • Passing the Hash
  • Password Profiling
  • Online Attacks
  • Medusa
  • Ncrack
  • Hydra
  • Password Hashes
  • Cracking Hashes
  • LM / NTLM

  • MODULE 16 :- Port Fun

  • Overview
  • Port Forwarding
  • SSH Tunnels
  • Dynamic Proxies
  • Proxy Chains

  • MODULE 17 :- Metasploit Framework

  • Overview
  • AUX Modules
  • SNMP Modules
  • SMB Modules
  • WEBDAV Modules
  • Database Services
  • Exploits
  • Payloads
  • Meterpreter
  • Meterpreter in Action
  • Additional Payloads
  • Binary Payloads
  • Multihandler
  • Porting Exploits
  • Post Exploitation

  • MODULE 18 :- Antivirus Avoidance

  • Overview
  • Shellter
  • Veil – Evasion
  • thefatrat

  • MODULE 19 :- Misconfigured Lab Setup WordPress lab Setup & Pentesting

  • Joomla Lab Setup & Pentesting
  • Drupal Lab Setup & Pentesting
  • Duration 6 to 7 Months
  • 250 GB Toolkit
  • Online & Offline Classes Available
  • Each Level Certificate
  • One All Level Diploma Certificate
  • 4 Months Internship Certificate Available
  • Interview Preparation
  • 100% Job Placement after Internship
  • Training by experienced trainners
  • Can Ask Direct questions and can resolve techincal questions with trainners
  • Standard classes, Group challenges , review sessions
  • 2 year Membership at Recon Force Training
  • Certificate After Training
  • Standard Study Environment
  • Best Training Environment
  • Checkpoint based training
  • Live Hacking
  • High speed internet.

Download SyllabusApply Now