Advanced Diploma Course Content

In this Diploma Course, we can provide the high quality Training for intermediate students who prepare for advance hacking skills in the cyber security field.

4 Advanced Levels

  • MODULE 1 :- xss
  • MODULE 2 :- Host header
  • MODULE 3 :- Url redirection
  • MODULE 4 :- Command injection
  • MODULE 5 :- Critical file found
  • MODULE 6 :- FIle inclusion
  • MODULE 7 :- Source code disclosure
  • MODULE 8 :- File upload
  • MODULE 9 :- Parameter tampering
  • MODULE 10 :- Spf
  • MODULE 11 :- SQL
  • MODULE 12 :- No rate limiting
  • MODULE 13 :- Long password dos
  • MODULE 14 :- IDOR
  • MODULE 15 :- Joomla security vulnerabilities
  • MODULE 16 :- Account lockout
  • MODULE 17 :- Apache http server byte range DOS
  • MODULE 18 :- Apache struts RCE Hunting
  • MODULE 19 :- Application server vulnerabilities
  • MODULE 20 :- Authentication testing
  • MODULE 21 :- Blind XSS
  • MODULE 22 :- Buffer overflow
  • MODULE 23 :- CMS hunting
  • MODULE 24 :- Compherensive Command injection
  • MODULE 25 :- Cryptographic vulnerabilities
  • MODULE 26 :- CSRF
  • MODULE 27 :- Drupal Security Vulnerabilities
  • MODULE 28 :- Account takeover through support service
  • MODULE 29 :- Exposed Source Control
  • MODULE 30 :- Extraction information and geo location through uploaded images
  • MODULE 31 :- Heartbleed
  • MODULE 32 :- HSTS
  • MODULE 33 :- HTTPOXY Attack
  • MODULE 34 :- Identity Management Testing
  • MODULE 35 :- Advanced Indirect object refrence
  • MODULE 36 :- Multi Factor Authentication (2FA) Security Testing
  • MODULE 37 :- Password Reset poisoning
  • MODULE 38 :- Server side injection (SSI)
  • MODULE 39 :- Session fixiation
  • MODULE 40 :- Shell Shock RCE testing
  • MODULE 41 :- SSRF
  • MODULE 42 :- Testing For Session Management
  • MODULE 43 :- Ticket Security testing
  • MODULE 44 :- Web cache deception Attack
  • MODULE 45 :- Webmin unauthentic RCE
  • MODULE 46 :- WordPress Security testing
  • MODULE 47 :- Application Logic Vulnerabilities
  • MODULE 48 :- Broken AUthentication
  • MODULE 49 :- Browser cache weakness
  • MODULE 50 :- cache testing
  • MODULE 51 :- CAPTCHA Security testing
  • MODULE 52 :- Code injection
  • MODULE 53 :- Cookies testing
  • MODULE 54 :- CORS
  • MODULE 55 :- CRLF injection
  • MODULE 56 :- CSS injection
  • MODULE 57 :- DANGEROUS http methods
  • MODULE 58 :- Testing for default configuration
  • MODULE 59 :- Directory lisitng testing
  • MODULE 60 :- DOM CLOBBERING
  • MODULE 61 :- HTTP PARAMETER POLLUTION
  • MODULE 62 :- Identity management testing
  • MODULE 63 :- LDAP injection
  • MODULE 64 :- LOg injection
  • MODULE 65 :- NULL BYTE INJECTION
  • MODULE 66 :- OAUTH Secruity testing
  • MODULE 67 :- Open redirection
  • MODULE 68 :- Web Application Firewall Testing
  • MODULE 69 :- Parameter Modification testing
  • MODULE 70 :- PHP Object injection
  • MODULE 71 :- RACE condition vulnerability
  • MODULE 72 :- Relative Path Overview
  • MODULE 73 :- Remote Code injection
  • MODULE 74 :- Http Headers testing
  • MODULE 75 :- SSL Security testing
  • MODULE 76 :- SSTI Testing
  • MODULE 77 :- template injection
  • MODULE 78 :- Virutal host Misconfiguration
  • MODULE 79 :- Vulnerable Remember me testing
  • MODULE 80 :- Weak Password reset
  • MODULE 81 :- Web Application Firewall Testing
  • MODULE 82 :- XML QUADRATIC BLOWUP
  • MODULE 83 :- XML RPC pingback
  • MODULE 84 :- XXE injection
  • MODULE 85 :- ADVANCED TRAINING ABOUT BURPSUITE
  • MODULE 1 :- Introduction to Malware Analysis
  • MODULE 2 :- Basic Of Analysis
  • MODULE 3 :- Advanced Static Analysis
  • MODULE 4 :- Analyzing Windows Programs
  • MODULE 5 :- Advanced Dynamic Analysis
  • MODULE 6 :- Malware Behaviour
  • MODULE 7 :- Data Encoding and Malware countermeasues
  • MODULE 8 :- Covert Malware Launching
  • MODULE 9 :- AntiAnalysis
  • MODULE 10 :- Packing and Unpacking
  • MODULE 11 :- Rootkit Techniques
  • MODULE 1 :- The IOT Security testing Overview
  • MODULE 2 :- Case Study: Connected and Self-Driving
  • MODULE 3 :- Vehicles Security
  • MODULE 4 :- Case Study: Microgrids
  • MODULE 5 :- Case Study: Smart City Drone System
  • MODULE 6 :- IOT Hardware and Software
  • MODULE 7 :- Communication and Messaging Protocols
  • MODULE 8 :- IOT Interfaces and Services
  • MODULE 9 :- Threats, Vulnerabilities and Risks
  • MODULE 10 :- Case Study: The Mirai Botnet Opens Up
  • MODULE 11 :- Pandora’s Box
  • MODULE 12 :- Today’s Attack Vector
  • MODULE 13 :- Current IOT Security Regulations
  • MODULE 14 :- Current IOT Privacy Regulations
  • MODULE 15 :- What is Threat Modeling
  • MODULE 16 :- An Introduction to IOT Security Architectures
  • MODULE 17 :- Identifying Assets
  • MODULE 18 :- Creating a System Architecture
  • MODULE 19 :- Documenting Threats
  • MODULE 20 :- Rating Threats
  • MODULE 21 :- IOT Privacy Concerns
  • MODULE 22 :- Privacy By Design (PbD)
  • MODULE 23 :- Conducting a Privacy Impact Assesments

    MODULE 1 :- Introduction

  • Finding Files
  • Services in Kali SSH Service
  • FTP Services
  • HTTP Service
  • Mysql Services
  • Service Management
  • MODULE 2 :- Basic Linux and Commands

  • Locate
  • Which
  • Find
  • Sed
  • Awk
  • Cut
  • Sort
  • Grep
  • Head
  • Tail
  • Wget
  • Cat
  • MODULE 3 :- Netcat Tutorials

  • Getting start with NC
  • Connecting to a Server
  • Fetching HTTP header
  • Chatting
  • Creating a Backdoor
  • Verbose Mode
  • Save Output to Disk
  • MODULE 4 :- Port Scanning

  • TCP Delay Scan
  • UDP Scan
  • Reverse TCP Shell Exploitation
  • Randomize Port
  • File Transfer
  • Reverse Netcat Shell Exploitation
  • Banner grabbing
  • Port Scanning With Nmap & Wireshark
  • TCP Connect Scan with wireshark
  • Network Sweeping with wireshark
  • SYN Scan with wireshark
  • UDP Scan with wireshark
  • FIN Scan with wireshark
  • Null Scan with wireshark
  • OS Discovery with wireshark
  • NSE Scripts with wireshark
  • Nmap Firewall Scan
  • MODULE 5 :- Enumeration

  • Overview
  • DNS Enumeration
  • Forward DNS Lookup
  • Reverse DNS Lookup
  • Zone Transfers
  • NetBIOS & SMB Enumeration
  • Null Sessions
  • Enum4Linux
  • SMB NSE Scripts
  • MSQL Enumeration
  • MSSQL Enumeration
  • SMTP Enumeration
  • VRFY Script
  • Python Port
  • SNMP Enumeration
  • SNMP MiB
  • SNMPWalk
  • MODULE 6 :- Passive Info Gathering

  • Overview
  • Google Search
  • Google Hacking
  • GHDB
  • Directory Bruteforce Attack
  • Dirb
  • Dirbuster
  • Dirsearch
  • Metasploit
  • MODULE 7 :- Reverse Shell

  • Php reverse shell
  • Python reverse shell
  • Perl reverse shell
  • Bash reverse shell
  • Msfvenom shell
  • MODULE 8 :- Intro to Overflows

  • Overview
  • Vulnerable Code
  • Stack Overflow
  • MODULE 9 :- Windows BO Example

  • Overview
  • Fuzzing
  • Crash Replication
  • Controlling EIP
  • Introducing Shellcode
  • Bad Characters
  • Redirecting Execution
  • Introducing Mona
  • Shellcode Payload
  • MODULE 10 :- Linux BO Example

  • Overview
  • Controlling EIP
  • Locating Space
  • First Stage Shellcode
  • Locating RET
  • Generating Shellcod
  • MODULE 11 :- Using Public Exploits

  • Overview
  • Finding Exploits
  • Exploit – DB
  • Fixing Exploits 1
  • Fixing Exploits 2
  • Cross – Compiling
  • MODULE 12 :- File Transfers

  • FTP
  • Python HTTP Server
  • php http server
  • HFS Tool
  • Netcat
  • CURL
  • SMB Server
  • Powershell File Transfer
  • Bitsadmin
  • Wget
  • TFTP
  • Python
  • MODULE 13 :- Linux Privilege Escalation

  • Suid Binaries
  • Absuing Sudo ‘ s Right
  • Kernel Exploit
  • Path Variables
  • Multiple Ways to edit / etc / passwd fill
  • Windows Privilege Escalation
  • Weak File Permissions
  • Always Install Elevated
  • Bypass UAC
  • Kernel Exploits
  • MODULE 14 :- Web Application Attacks

  • Overview
  • Local File Inclusion
  • SQL Injection
  • Authentication Bypass
  • Error Based Enum
  • Blind SQL Injection
  • Attack Proxies
  • SQLMap
  • MODULE 15 :- Password Cracking

  • Overview
  • Crunch
  • Passing the Hash
  • Password Profiling
  • Online Attacks
  • Medusa
  • Ncrack
  • Hydra
  • Password Hashes
  • Cracking Hashes
  • LM / NTLM
  • MODULE 16 :- Port Fun

  • Overview
  • Port Forwarding
  • SSH Tunnels
  • Dynamic Proxies
  • Proxy Chains
  • MODULE 17 :- Metasploit Framework

  • Overview
  • AUX Modules
  • SNMP Modules
  • SMB Modules
  • WEBDAV Modules
  • Database Services
  • Exploits
  • Payloads
  • Meterpreter
  • Meterpreter in Action
  • Additional Payloads
  • Binary Payloads
  • Multihandler
  • Porting Exploits
  • Post Exploitation
  • MODULE 18 :- Antivirus Avoidance

  • Overview
  • Shellter
  • Veil – Evasion
  • thefatrat
  • MODULE 19 :- Misconfigured Lab Setup WordPress lab Setup & Pentesting

  • Joomla Lab Setup & Pentesting
  • Drupal Lab Setup & Pentesting
  • Duration 6 to 7 Months
  • 250 GB Toolkit
  • Online & Offline Classes Available
  • Each Level Certificate
  • One All Level Diploma Certificate
  • 4 Months Internship Certificate Available
  • Interview Preparation
  • 100% Job Placement after Internship
  • Training by experienced trainners
  • Can Ask Direct questions and can resolve techincal questions with trainners
  • Standard classes, Group challenges , review sessions
  • 2 year Membership at Recon Force Training
  • Certificate After Training
  • Standard Study Environment
  • Best Training Environment
  • Checkpoint based training
  • Live Hacking
  • High speed internet.

Apply Now