Included Services
- VA/PT Interview Preparation
- 1,2,4 Hour Batches
- 350 GB Hacking Toolkit
- 8 Months Course Duration
Benifits of services
- 1 Year Membership
- Hindi or English Language
- Online and Offline Training
- 7+ Year Experience Trainer
Join 8 Months Advanced Cyber Security Diploma
Recon Cyber Security is one of India's best and most well-known Advance Cyber Security Diploma training center with high-tech infrastructure. The institute offers best Cyber Security training that is customized according to the content requirement of each and every student. Recon Cyber Security is the credible and one of the Best Cyber Security Training institutes in india. Post completion of the training the students are awarded Recon Cyber Security certification that is widely recognized in the industry is a validation of one's skills and expertise.
Course Content and Syllabus for Advance Diploma in Cyber Security
- πΆ XSS
- πΆ Host Header
- πΆ Url Redirection
- πΆ Command Injection
- πΆ Critical File Found
- πΆ FIle Inclusion
- πΆ Source Code Disclosure
- πΆ File Upload
- πΆ Parameter Tampering
- πΆ SPF
- πΆ SQL
- πΆ No Rate limiting
- πΆ Long Password Dos
- πΆ IDOR
- πΆ Joomla Security Vulnerabilities
- πΆ Account Lockout
- πΆ Apache http Server Byte Range DOS
- πΆ Apache Struts RCE Hunting
- πΆ Application Server Vulnerabilities
- πΆ Authentication Testing
- πΆ Blind XSS
- πΆ Buffer Overflow
- πΆ CMS Hunting
- πΆ Compherensive Command Injection
- πΆ Cryptographic Vulnerabilities
- πΆ CSRF
- πΆ Drupal Security Vulnerabilities
- πΆ Account takeover Through Support Service
- πΆ Exposed Source Control
- πΆ Extraction Information And Geo Location Through Uploaded images
- πΆ Heartbleed
- πΆ HSTS
- πΆ HTTPOXY Attack
- πΆ Identity Management Testing
- πΆ Advanced Indirect object Refrence
- πΆ Multi Factor Authentication (2FA) Security Testing
- πΆ Password Reset Poisoning
- πΆ Server side injection (SSI)
- πΆ Session Fixiation
- πΆ Shell Shock RCE Testing
- πΆ SSRF
- πΆ Testing For Session Management
- πΆ Ticket Security Testing
- πΆ Web Cache Deception Attack
- πΆ Webmin Unauthentic RCE
- πΆ WordPress Security testing
- πΆ Application Logic Vulnerabilities
- πΆ Broken AUthentication
- πΆ Browser Cache Weakness
- πΆ Cache Testing
- πΆ CAPTCHA Security Testing
- πΆ Code Injection
- πΆ Cookies Testing
- πΆ CORS
- πΆ CRLF Injection
- πΆ CSS Injection
- πΆ DANGEROUS HTTP Methods
- πΆ Testing For Default Configuration
- πΆ Directory Lisitng Testing
- πΆ DOM Clobbering
- πΆ HTTP Parameter Pollution
- πΆ Identity Management Testing
- πΆ LDAP Injection
- πΆ LOG Injection
- πΆ Null Byte Injection
- πΆ Oauth Secruity Testing
- πΆ Open Redirection
- πΆ Web Application Firewall Testing
- πΆ Parameter Modification Testing
- πΆ PHP Object Injection
- πΆ RACE Condition Vulnerability
- πΆ Relative Path Overview
- πΆ Remote Code Injection
- πΆ Http Headers Testing
- πΆ SSL Security Testing
- πΆ SSTI Testing
- πΆ Template Injection
- πΆ Virutal host Misconfiguration
- πΆ Vulnerable Remember Me Testing
- πΆ Weak Password reset
- πΆ Web Application Firewall Testing
- πΆ XML Quadratic Blowup
- πΆ XML RPC Pingback
- πΆ XXE Injection
- πΆ Advanced Training About Burpsuite
- π’ Online / Offline Training
- π’ Live Practical training
- π’ Interview Questions
- π’ Test After completion
- πΆ The IOT Security testing Overview
- πΆ Case Study: Connected and Self-Driving
- πΆ Vehicles Security
- πΆ Case Study: Microgrids
- πΆ Case Study: Smart City Drone System
- πΆ IOT Hardware and Software
- πΆ Communication and Messaging Protocols
- πΆ IOT Interfaces and Services
- πΆ Threats, Vulnerabilities and Risks
- πΆ Case Study: The Mirai Botnet Opens Up
- πΆ Pandoraβs Box
- πΆ Todayβs Attack Vector
- πΆ Current IOT Security Regulations
- πΆ Current IOT Privacy Regulations
- πΆ What is Threat Modeling
- πΆ An Introduction to IOT Security Architectures
- πΆ Identifying Assets
- πΆ Creating a System Architecture
- πΆ Documenting Threats
- πΆ Rating Threats
- πΆ IOT Privacy Concerns
- πΆ Privacy By Design (PbD)
- πΆ Conducting a Privacy Impact Assessments
- π’ Online / Offline Training
- π’ Live Practical training
- π’ Interview Questions
- π’ Test After completion
- πΆ Introduction to Malware Analysis
- πΆ Basic Of Analysis
- πΆ Advanced Static Analysis
- πΆ Analyzing Windows Programs
- πΆ Advanced Dynamic Analysis
- πΆ Malware Behaviour
- πΆ Data Encoding and Malware countermeasues
- πΆ Covert Malware Launching
- πΆ AntiAnalysis
- πΆ Packing and Unpacking
- πΆ Rootkit Techniques
- π’ Online / Offline Training
- π’ Live Practical training
- π’ Interview Questions
- π’ Test After completion
- πΆ Introduction
- β’ Finding Files
- β’ Services in Kali SSH Service
- β’ FTP Services
- β’ HTTP Service
- β’ Mysql Services
- β’ Service Management
- πΆ Basic Linux and Commands
- β’ Locate
- β’ Which
- β’ Find
- β’ Sed
- β’ Awk
- β’ Cut
- β’ Sort
- β’ Grep
- β’ Head
- β’ Tail
- β’ Wget
- β’ Cat
- πΆ Netcat Tutorials
- β’ Getting start with NC
- β’ Connecting to a Server
- β’ Fetching HTTP header
- β’ Chatting
- β’ Creating a Backdoor
- β’ Verbose Mode
- β’ Save Output to Disk
- πΆ Port Scanning
- β’ TCP Delay Scan
- β’ UDP Scan
- β’ Reverse TCP Shell Exploitation
- β’ Randomize Port
- β’ File Transfer
- β’ Reverse Netcat Shell Exploitation
- β’ Banner grabbing
- β’ Port Scanning With Nmap & Wireshark
- β’ TCP Connect Scan with wireshark
- β’ Network Sweeping with wireshark
- β’ SYN Scan with wireshark
- β’ UDP Scan with wireshark
- β’ FIN Scan with wireshark
- β’ Null Scan with wireshark
- β’ OS Discovery with wireshark
- β’ NSE Scripts with wireshark
- β’ Nmap Firewall Scan
- πΆ Enumeration
- β’ Overview
- β’ DNS Enumeration
- β’ Forward DNS Lookup
- β’ Reverse DNS Lookup
- β’ Zone Transfers
- β’ NetBIOS & SMB Enumeration
- β’ Null Sessions
- β’ Enum4Linux
- β’ SMB NSE Scripts
- β’ MSQL Enumeration
- β’ MSSQL Enumeration
- β’ SMTP Enumeration
- β’ VRFY Script
- β’ Python Port
- β’ SNMP Enumeration
- β’ SNMP MiB
- β’ SNMPWalk
- πΆ Passive Info Gathering
- β’ Overview
- β’ Google Search
- β’ Google Hacking
- β’ GHDB
- β’ Directory Bruteforce Attack
- β’ Dirb
- β’ Dirbuster
- β’ Dirsearch
- β’ Metasploit
- πΆ Reverse Shell
- β’ Php reverse shell
- β’ Python reverse shell
- ’ Perl reverse shell
- β’ Bash reverse shell
- β’ Msfvenom shell
- πΆ Intro to Overflows
- β’ Overview
- β’ Vulnerable Code
- β’ Stack Overflow
- πΆ Windows BO Example
- β’ Overview
- β’ Fuzzing
- β’ Crash Replication
- β’ Controlling EIP
- β’ Introducing Shellcode
- β’ Bad Characters
- β’ Redirecting Execution
- β’ Introducing Mona
- β’ Shellcode Payload
- πΆ Linux BO Example
- β’ Controlling EIP
- β’ Locating Space
- β’ First Stage Shellcode
- β’ Locating RET
- β’ Generating Shellcod
- πΆ Using Public Exploits
- β’ Overview
- β’ Finding Exploits
- β’ Exploit β DB
- β’ Fixing Exploits 1
- β’ Fixing Exploits 2
- β’ Cross β Compiling
- πΆ File Transfers
- β’ Python HTTP Server
- β’ php http server
- β’ HFS Tool
- β’ Netcat
- β’ CURL
- β’ SMB Server
- β’ Powershell File Transfer
- β’ Bitsadmin
- β’ Wget
- β’ TFTP
- β’ Python
- πΆ Linux Privilege Escalation
- β’ Suid Binaries
- β’ Absuing Sudo β s Right
- β’ Kernel Exploit
- β’ Path Variables
- β’ Multiple Ways to edit / etc / passwd fill
- β’ Windows Privilege Escalation
- β’ Weak File Permissions
- β’ Always Install Elevated
- β’ Bypass UAC
- β’ Kernel Exploits
- πΆ Web Application Attacks
- β’ Authentication Bypass
- β’ Error Based Enum
- β’ Blind SQL Injection
- β’ Attack Proxies
- β’ SQLMap
- πΆ Password Cracking
- β’ Overview
- β’ Crunch
- β’ Passing the Hash
- β’ Password Profiling
- β’ Online Attacks
- β’ Medusa
- β’ Ncrack
- β’ Hydra
- β’ Password Hashes
- β’ Cracking Hashes
- β’ LM / NTLM
- πΆ Port Fun
- β’ Overview
- β’ Port Forwarding
- β’ SSH Tunnels
- β’ Dynamic Proxies
- β’ Proxy Chains
- πΆ Metasploit Framework
- β’ Overview
- β’ AUX Modules
- β’ SNMP Modules
- β’ SMB Modules
- β’ WEBDAV Modules
- β’ Database Services
- β’ Exploits
- β’ Payloads
- β’ Meterpreter
- β’ Meterpreter in Action
- β’ Additional Payloads
- β’ Binary Payloads
- β’ Multihandler
- β’ Porting Exploits
- β’ Post Exploitation
- πΆ Antivirus Avoidance
- β’ Overview
- β’ Shellter
- β’ Veil β Evasion
- β’ thefatrat
- πΆ Misconfigured Lab Setup WordPress lab Setup & Pentesting
- β’ Joomla Lab Setup & Pentesting
- β’ Drupal Lab Setup & Pentesting
- π’ Online / Offline Training
- π’ Live Practical training
- π’ Interview Questions
- π’ Test After completion
Our Free Services
Blogs and News
You can read about the latest updates and tools for Cyber Security.
Learning Videos and Tutorials
You can read and watch the free videos about cyber security.