|...Big Data technologies • Security Analytics... • ELK • Hadoop • Vulnerability Dashboard • Map-Reduce • Stack Smashing • SEH • Hive • Yarn • Forensic and Application Log Analysis • Data Enrichment using TI • brute-force attacks • Apache Metron||3 days|
|...Windows Internals Essentials • Cyber Security Analysts... • LiveKD • Sysinternals Suite • Debugging Tools for Window • Masm32 • VC++/MASM32 • API function • Windows Architecture • data structures • System Mechanisms • Windbg • Object Manager||4 days|
|...Fuzzing • Linux Exploitation... • Windows Exploitation • Shell Code • Windows Exploitation • Linux Exploitation • Stack Smashing • SEH • DEP • ASLR • Heap-spraying • IE Off-by-One • Use of Debug Tools • Metasploit Modules • Writing Metasploit exploits||2 days|
|...Shell Code • Cross Compilation... • MSF Encoders • Creating Malicious Files • Antivirus Evasion • MSF Payload • Metasploit Modules • Writing Exploit Code • Exploit Automation||2 days|
|...Application Security • OWASP... • Platform Security • Dissembling Mobile Application • Reverse Engineering • OWASP Mobile Security • Permission Set Auditing • Bring Your Own Device (BYOD) • Security Testing Methodologies||2 days|
|...PE • APT & Malwares... This course introduces the concept of malware, how they function, their types and how they are extensively used in Advanced Persistent attacks (APT's) to siphon off the critical business information from an organization on regular basis. We start off with the concepts of Process explorer, disassembling v/s debugging with advanced debugging features. We also set breakpoints to crack down an application dissecting it to the level where malware code is present.||3 days|
|...Reversing .NET applications • delphi applications... Reverse engineering is the process of discovering the technological principles of a device, object, or system through analysis of its structure, function, and operation. This allows us to visualize the software’s structure, its operations, and the features that drive its behavior. The techniques of analysis, and the application of automated tools for software examination, give us a reasonable way to comprehend the complexity of the software and to uncover its truth.||3 days|
This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.