Following details will be shared with the tutors you will contact:
Confirm to delete
Are you sure want to delete this?
NarasingaraoCybersecurity,SOC,VAPT,CEH
No reviews yet
I have 18 years experience on ethical hacking,penetration testing and cybersecurity . i have teach the 1000+ students per month batch wise i will given certification guidance i will given guidance for resume make and interview handling i will given the real time type oriented practices every class conduct the practicals my teaching special is one to one maximum on online we follow the maximum real time oriented practice we will give the 100% assurance job oriented training Lot of students settled with my guidance Will give security management skills include will give reporting practice for penetration testing
i have 18 years real time experience on ethical hacking,information security analyst,penetration testing and cyber security my working companies are 1 TCS ********* Standard IT Solutions ********* SVS Education Service Private Limited ********* Ratna Technical education skills Private Limited (2017-Present)
Module 01: Introduction to Ethical Hacking Module 02: Kali Linux Basics Module 03: Expertizing Anonymization Module 04: Proxies and VPN Module 05: Browsing Deep Web and Dark Web using Tor Module 06: Information Gathering Module 07: Network Scanning Module 08: Port Scanning Module 09: DNS Enumeration Module 10: Password Cracking Module 11: Vulnerability Identification Module 12: Introduction to Metasploit Framework Module 13: Hacking Windows Operating System using Metasploit Module 14: Hacking Linux Operating System using Metasploit Module 15: Privilege Escalation Module 16: Creating backdoors for Windows and Linux Module 17: Sniffing Module 18: Social Engineering Module 19: Denial of Service attack Module 20: Session Hijacking Module 21: Web Server Hacking Module 22: Web page defacement Module 23: Web Application Attacks Module 24: SQL Injection Module 25: WiFi Hacking Module 26: Mobile Hacking Module 27: IoT Hacking techniques Module 28: Cryptography Basics Module 29: Steganography Module 30: Firewall Configuration Module 31: Setting up an Intrusion Detection System Module 32: Honeypots
List of Penetration Testing Topics
Module 1: Penetration Testing Methodology Module 2: Information gathering Module 3: Enumerating Target Module 4:Social Engineering Module 5:Target Exploitation Module 6: Privilege Escalation Module 7: Net work pentesting Module 8:Web Application Pentesting Module 9: Wireless Security Analysis Module 10: Mobile Pentesting Module 11:Supplementary Tools Module 12:Documentation and Reporting Module 13:Basics of Bash Scripting Module 14:Firewall bypass Techniques Module 15:IDS Rule understanding and analysis