https://reconforce.in/ beginner hacking diploma course - diploma course & ethical hacker course with certificate

Basic Diploma Course Content

In this Diploma Course, we provide the best quality Training for beginners in Cyber Security field.

We have 5 Level's of Cyber Security in this Diploma

  • MODULE 1 :- Introduction to Ethical Hacking
  • MODULE 2 :- Lab Setup/Installing Tools(Enviroment Creation)
  • MODULE 3 :- Scanning
  • MODULE 4 :- Enumeration
  • MODULE 5 :- System Hacking
  • MODULE 6 :- Malwares
  • MODULE 7 :- Sniffing
  • MODULE 8 :- Social Engineering
  • MODULE 9 :- Denial Of Service (Dos/Ddos)
  • MODULE 10 :- Session Hijacking
  • MODULE 11 :- Hacking Web Applications
  • MODULE 12 :- Hacking Web Servers
  • MODULE 13 :- Wireless network’s Hacking
  • MODULE 14 :- Hacking Mobile Devices
  • MODULE 15 :- IDS,Firewalls & Honeypots
  • MODULE 16 :- Buffer Overflaws
  • MODULE 17 :- Cryptography
  • MODULE 18 :- Steganography
  • MODULE 19 :- IoT Hacking
  • MODULE 20 :- Cloud Security
  • MODULE 21 :- Penetration Testing Basics
  • MODULE 22 :- Phases of Pentration testing.
  • MODULE 1 :- Introduction to Networking
  • MODULE 2 :- Networking Fundamentals
  • MODULE 3 :- OSI Model
  • MODULE 4 :- TCP/IP Model
  • MODULE 5 :- Concept of Layers
  • MODULE 6 :- Lab Configuration
  • MODULE 7 :- Network Devices Fundamentals
  • MODULE 8 :- Internet Protocols
  • MODULE 9 :- Difference between IPv4 & IPv6
  • MODULE 10 :- Subnetting
  • MODULE 11 :- Router Fundamentals
  • MODULE 12 :- Routing Protocols
  • MODULE 13 :- WAN Protocols
  • MODULE 14 :- PPP/ NAT & NAT PAT
  • MODULE 15 :- SSH
  • MODULE 16 :- DHCP
  • MODULE 17 :- BGP
  • MODULE 1 :- How to plan your penetration testing
  • MODULE 2 :- Scoping your penetration testing
  • MODULE 3 :- Network And Web-Application
  • MODULE 4 :- Scanning
  • MODULE 5 :- Explotation with Metasploit
  • MODULE 6 :- Post Exploitation Phase
  • MODULE 7 :- Browser Exploitation
  • MODULE 8 :- Pivoting Attack
  • MODULE 9 :- In Depth Password Attacks
  • MODULE 10 :- Cracking/Solving CTF’s
  • MODULE 11 :- Final Analysis
  • MODULE 12 :- Final Report Generation
  • MODULE 1 :- Introduction to Web-application Penetration-Testing
  • MODULE 2 :- Finding Subdomains
  • MODULE 3 :- Understanding HTTP
  • MODULE 4 :- Access Control Flaws
  • MODULE 5 :- Ajax Security
  • MODULE 6 :- Authentication Flaws
  • MODULE 7 :- Buffer overflaws
  • MODULE 8 :- Code Quality
  • MODULE 9 :- Concurrency Flaws
  • MODULE 10 :- Cross Site Scripting
  • MODULE 11 :- Improper Error Handling
  • MODULE 12 :- Injection Flaws
  • MODULE 13 :- Denail of Service
  • MODULE 14 :- Insecure Communication
  • MODULE 15 :- Insecure Configuration
  • MODULE 16 :- Insecure Storage
  • MODULE 17 :- Malicious File Execution
  • MODULE 18 :- Parameter Tampering
  • MODULE 19 :- Session Management Flaws
  • MODULE 20 :- Challenge Online Platform
  • MODULE 1 :- Android Fundamentals
  • MODULE 2 :- Improper Platform usage
  • MODULE 3 :- Insecure Data Storage
  • MODULE 4 :- Insecure Communication
  • MODULE 5 :- Insecure Authentication
  • MODULE 6 :- Insecure Authorization
  • MODULE 7 :- Client Code quality
  • MODULE 8 :- Trojan & Backdoor
  • MODULE 9 :- Code Tampering
  • MODULE 10 :- Reverse Engineering
  • MODULE 11 :- Live Application Testing
  • MODULE 12 :- Testing with Burp Suite
  • MODULE 13 :- Testing Application on Genymotion
  • Duration 5 to 6 Months
  • 200 GB Toolkit
  • Online & Offline Classes Available
  • Each Level Certificate
  • One All Level Diploma Certificate
  • 3 Months Internship Certificate Available
  • Interview Preparation
  • 100% Job Placement after Internship
  • Training by experienced trainners
  • Can Ask Direct questions and can resolve techincal questions with trainners
  • Standard classes, Group challenges , review sessions
  • 1 year Membership at Recon Force Training
  • Certificate After Training
  • Standard Study Environment
  • Best Training Environment
  • Checkpoint based training
  • Live Hacking
  • High speed internet.

Apply Now