Select Page

SOC Analyst Training

SOC Analyst Training

⏰24 hours | ▶️ 24 Videos | 📣 8262 Participants | 🎓 3950 Reviews | 4.8 ⭐⭐⭐⭐⭐

Choose a Plan that Works for You

Upcoming Batches PST

 Weekday 

June 11(1 HR A DAY)
07:00 PM PST
Enroll Now  →

 Weekday 

June 27(1 HR A DAY)
07:00 AM PST
Enroll Now  →

 Weekend

June 28(1 HR A DAY)
07:00 PM PST
Enroll Now  →

Upcoming Batches IST

 Weekday 

June 12(1 HR A DAY)
07:30 AM IST
Enroll Now  →

 Weekday 

June 27(1 HR A DAY)
07:30 PM IST
Enroll Now  →

 Weekend 

June 29(1 HR A DAY)
07:30 AM IST
Enroll Now  →

Course Description

Security operation center (SOC) analyst training provides knowledge on security information management and security event management.

Security analysts needed to know information technology security tools and their functions, moral knowledge on software and hardware tools.

Our course includes IT security, cybersecurity, cloud security, big data concepts, and the internet of crucial remedies to be a SOC analyst.

Get enrolled with our online classes and learn the fundamental requirements of a security operation center analyst with 24/7 tech support.

Acquire hands-on experiments under our trainer and get practiced on the different security tools.

Build a roadmap for cracking the SOC certification exam and drive towards your dream job as a SOC analyst.

Features

✅Lifetime access ✅Lifetime video access
✅Real-time case studies ✅The project integrated into the Curriculum
✅24*7 Support from our team of administrators

Course Content

1.Security Operations Centre

Introduction to SOC

  • Building a successful SOC
  • Functions of SOC
  • Heart of SOC- SIEM
  • Gartner’s magic quadrant
  • SIEM guidelines and architecture

ELK Stack:

  • Introduction and an overview of Elastic SIEM
  • User interface
  • How to as a part of alert investigations or interactive threat hunting
  • MDR vs. Traditional SIEM; and other various solutions
  • Elastic search: Understanding of Architecture, curator fundamentals
  • Index template for routing, mapping
  • KIBANA: Configuration, policies, visualization
  • Deep-dive of Log architecture, parsing, alerts

SecurityOnion

  • What is Security Onion?
  • Monitoring and analysis tools
  • Security Onion Architecture
  • Deployment types
  • Installing a Standalone server: checking system services with sostat, security onion with web browser tools, security onion terminal
  • Replaying traffic on a standalone server

Splunk In-Depth

  • Industrial requirements of Splunk in various fields
  • Splunk terminologies, search processing language, and various industry use cases AlienVault OSSIM fundamentals
  • AlienVault fundamentals and architecturedeployment
  • Vulnerability scanning & monitoring with OSSIM

Introduction to QRadar

  • IBM QRadar SIEM component architecture and data flows
  • Using the QRadar SIEM User Interface

Fun with logs

  • Working with offense triggered by events
  • Working with offense triggered by flows

Monitoring

  • Monitor QRadar Notifications and error messages.
  • Monitor QRadar performance
  • Review and interpret system monitoring dashboards.
  • Investigate suspected attacks and policy breaches
  • Search, filter, group, and analyze security data

Tools exposure provided in the above section:

  • SecurityOnion
  • ELK Stack
  • SGUILD
  • Wireshark
  • Splunk
  • AlienVault OSSIM
  • IBM Qradar CE

2.Digital Forensics

1. Introduction to Incident Response

  • Section Introduction
  • What is Digital Forensics?
  • Collecting evidence typically related to cybercrime
  • Digital Subject Access Requests
  • Computer Forensics Process
  • Identification, Preservation, collection, examination, analysis, reporting
  • Working with Law Enforcement
  • The difference between an internal security issue and one that requires external assistance

2. Forensics Fundamentals Section Introduction

  • Introduction to Data Representation hexadecimal, octal, binary files vs. txt files, timestamp formats: UNIX epoch, MAC, Chrome, Windows, FILETIME
  • Hard Drive Basics
  • Platters, sectors, clusters, slack space
  • SSD Drive Basics
  • garbage, collection, TRIM, wear leveling
  • File Systems
  • FAT16, FAT32, NTFS, EXT3/EXT4, HFS+/APFS
  • Metadata & File Carving
  • Memory, Page File, and Hibernation File
  • Order of Volatility

3. Evidence Forms

  • Section Introduction
  • Volatile Evidence
  • Memory RAM, Cache, Registers content, Routing tables, ARP cache, process table,kernel statistics, temporary filesystem/swap space
  • Disk Evidence
  • Data on Hard Disk or SSD
  • Network Evidence
  • Remotely Logged Data, Network Connections/Netflow, PCAPs, Proxy logs
  • Web & Cloud Evidence
  • Cloud storage/backups, chat rooms, forums, social media posts, blog posts
  • Evidence Forms
  • Laptops, desktops, phones, hard drives, tablets, digital cameras, smartwatches, GPS

4. Chain of Custody

  • Section Introduction
  • What is the Chain of Custody?
  • Why is it Important?
  • In regard to evidence integrity and examiner authenticity
  • Guide for Following the Chain of Custody
  • evidence collection, reporting/documentation, evidence hashing, write-blockers, working on a copy of original evidence

5. Windows Investigations

  • Section Introduction
  • Artifacts
  • Registry, Event Logs, Prefetch, .LNK files, DLLs, services, drivers, common malicious locations, schedules tasks, start-up files
  • Limitations
  • Example Investigations

6. *nix Investigations

  • Section Introduction
  • Artefacts
  • Limitations
  • Example Investigations
  • Artefact Collection
  • Section Introduction
  • Equipment
  • non-static bags, faraday cage, labels, clean hard drives, forensic workstations,

Disk imagers, hardware write blockers, cabling, blank media, and photographs

  • Tools
  • Wireshark, Network Miner, and others
  • ACPO Principles
  • Live Forensics
  • Fast acquisition of key files
  • How to Collect Evidence
  • Laptops, desktops, phones, hard drives, tablets, websites, forum posts, blog posts, social media posts, chat rooms
  • Types of Hard Drive Copies visible data, bit for bit, slackspace

7. Live Forensics

  • Section Introduction
  • Live Acquisition
  • What is a live acquisition/live forensics? Why is it beneficial?
  • Products
  • Carbon Black, Encase, memory analysis with agents, Custom Scripts
  • Potential Consequences
  • Damaging or modifying evidence making it invalid

8. Post-Investigation

  • Section Introduction
  • Report Writing
  • Evidence Retention
  • Legal retention periods, internal retention periods
  • Evidence Destruction
  • Overwriting, degaussing, shredding, wiping
  • Further Reading

9. Tools exposure provided in the above section:

  • Command-LINE for Windows / Linux
  • FTK IMAGER
  • MAGNATE RAM CAPTURE
  • AUTOPSY
  • Volatility
  • Volatility WorkBench
  • ENCASE

3.Incident Response Domain

1. Introduction to Incident Response

  • What is Incident Response?
  • Why is IR Needed?
  • Security Events vs. Security Incidents
  • Incident Response Lifecycle – NIST SP 800 61r2
  • What is it, why is it used
  • Lockheed Martin Cyber Kill Chain
  • What is it, why is it used
  • MITRE ATT&CK Framework
  • What is it, why is it used

2. Preparation

  • Incident Response Plans, Policies, and Procedures
  • The Need for an IR Team
  • Asset Inventory and Risk Assessment to Identify High-Value Assets
  • DMZ and Honeypots
  • Host Defenses
  • HIDS, NIDS
  • Antivirus, EDR
  • Local Firewall
  • User Accounts
  • GPO
  • Network Defenses
  • NIDS
  • NIPS
  • Proxy
  • Firewalls
  • NAC
  • Email Defenses
  • Spam Filter
  • Attachment Filter
  • Attachment Sandboxing
  • Email Tagging
  • Physical Defenses
  • Deterrents
  • Access Controls
  • Monitoring Controls
  • Human Defenses
  • Security Awareness Training
  • Security Policies
  • Incentives

3. Detection and Analysis

  • Common Events and Incidents
  • Establishing Baselines and Behavior Profiles
  • Central Logging (SIEM Aggregation)
  • Analysis (SIEM Correlation)

4. Containment, Eradication, Recovery

  • CSIRT and CERT Explained
  • What are they, and why are they useful?
  • Containment Measures
  • Network Isolation, Single VLAN, Powering System(s) Down, Honeypot Lure
  • Taking Forensic Images of Affected Hosts
  • Linking Back to Digital Forensics Domain
  • Identifying and Removing Malicious Artefacts
  • Memory and disk analysis to identify artefacts and securely remove them
  • Identifying Root Cause and Recovery Measures

5. Lessons Learned

  • What Went Well?
  • Highlights from the Incident Response
  • What could be improved?
  • Issues from the Incident Response, and How These Can be addressed
  • Important of Documentation
  • Creating Runbooks for Future Similar Incidents, Audit Trail
  • Metrics and Reporting
  • Presenting Data in Metric Form
  • Further Reading

6. Tools exposure provided in the above section:

  • SYSINTERNAL SUITE
  • Hash Calculator
  • Online Sources
  • CyberChef
  • Wireshark
  • Network Minor

4.Threat Intelligence Domain

1.Section Introduction

  • Threat Intelligence Explained
  • What is TI, why is it used?
  • Why Threat Intelligence can be Valuable
  • Situational awareness, investigation enrichment, reducing the attack surface
  • Criticisms/Limitations of Threat Intelligence
  • Attribution issues, reactive nature, old IOCs, false-positive IOCs
  • The Future of Threat Intelligence
  • Tenable Predictive Prioritization (mixing threat intel with vulnerability management data to calculate dynamic risk scores)
  • Types of Intelligence
  • SIGINT, OSINT, HUMINT, GEOINT

2. Threat Actors

  • Common Threat Agents
  • Cybercriminals, hacktivists, insider threats, nation-states
  • Motivations
  • Financial, social, political, other
  • Skill Levels/Technical Ability
  • Script Kiddies, Hackers, APTs
  • Actor Naming Conventions
  • Animals, APT numbers, other conventions
  • Common Targets
  • Industries, governments, organizations

3. Advanced Persistent Threats

  • What are APTs?
  • What makes an APT? Real-world examples of APTs + their operations
  • Motivations for Cyber Operations
  • Why APTs do what they do (financial, political, social)
  • Tools, Techniques, Tactics
  • What do APTs actually do when conducting operations
  • Custom Malware/Tools
  • Exploring custom tools used by APTs, why they’re used
  • Living-off-the-land Techniques
  • What LOTL is, why it’s used, why it can be effective
  1. Operational Intelligence
  • Indicators of Compromise Explained & Examples
  • What IOCs are, how they’re generated and shared, using IOCs to feed defenses
  • Precursors Explained & Examples
  • What precursors are, how they’re different from IOCs, how we monitor them
  • TTPs Explained & Examples
  • What TTPs are, why they’re important, using to maintain defences (preventative)
  • MITRE ATT&CK Framework
  • Framework explained and how we map cyber-attacks, real-world example
  • Lockheed Martin Cyber Kill Chain
  • Framework explained and how we map cyber-attacks, real-world example
  • Attribution and its Limitations
  • Why attribution is hard, impersonation, sharinginfrastructure, copy-cat attacks

5. Tactical Threat Intelligence

  • Threat Exposure Checks Explained
  • What TECs are, how to check your environment for the presence of bad IOCs
  • Watchlists/IOC Monitoring
  • What are watchlists, how to monitor for IOCs (SIEM, IDPS, AV, EDR, FW)
  • Public Exposure Assessments
  • What PEAs are, how to conduct them, google dorks, harvester, social media
  • Open-Web Information Collection
  • How OSINT data is scraped, why it’s useful
  • Dark-Web Information Collection
  • How intel companies scrape dark web intel, why it’s useful, data breach dumps, malicious actors on underground forums, commodity malware for sale
  • Malware Information Sharing Platform (MISP)
  • What is MISP, why is it used, how to implement MISP

Tools exposure provided in the above section:

  • AlienVAULT OTX
  • MITRE & ATTACK
  • MISP
  • Maltego
  • ONLINE SOURCES

6. Strategic Threat Intelligence

  • Intelligence Sharing and Partnerships
  • Why sharing intel is important, existing partnerships, US-CERT, NCCIC, NCSC, ISACs
  • IOC/TTP Gathering and Distribution
  • Campaign Tracking & Situational Awareness
  • Why we track actors, why keeping the team updated is important
  • New Intelligence Platforms/Toolkits
  • Undertaking proof-of-value demos to assess the feasibility of new tooling
  • OSINT vs. Paid-for Sources
  • Threat Intelligence Vendors, Public Threat Feeds, National Vulnerability Database, Twitter

7. Malware and Global Campaigns

  • Types of Malware Used by Threat Actors
  • Trojans, RATs, Ransomware, Back- doors, Logic Bombs
  • Globally recognized Malware Campaigns
  • Emotet, Magecart, IcedID, Sodinikobi, Trickbot, Lokibot

8. Further Reading

  • Further Reading Material
  • Links to more resources that students may find helpful.

FAQ’s

(more…)

Qradar SIEM Training

Qradar SIEM Training

⏰24 hours | ▶️ 24 Videos | 📣 7925 Participants | 🎓 3481 Reviews | 4.8 ⭐⭐⭐⭐⭐

Choose a Plan that Works for You

Upcoming Batches PST

 Weekday 

June 09(1 HR A DAY)
06:00 PM PST
Enroll Now  →

 Weekday 

June 26(1 HR A DAY)
06:00 AM PST
Enroll Now  →

 Weekend

June 28(1 HR A DAY)
06:00 PM PST
Enroll Now  →

Upcoming Batches IST

 Weekday 

June ​​10(1 HR A DAY)
07:30 AM IST
Enroll Now  →

 Weekday 

June 26(1 HR A DAY)
07:30 PM IST
Enroll Now  →

 Weekend 

June 29(1 HR A DAY)
07:30 AM IST
Enroll Now  →

Course Description

QRadar training is for the QRadar intelligence platform, which gives the unified planning of cohesive functions with a single Security Operations Center(SOC)user interface.

Developed ORadar training to provide security in different firms of an organization.

Our platform provides online classes under expert trainers with all-time support to learn your course in your free time.

Our courses cover all the essential modules required for an QRadar certification exam, along with a hands-on experiment.

This ecurity QRadar SIEM certification validates once demonstration and technical knowledge to provision Security QRadar

Enroll with us and learn different security modules of QRadar and hold your certification by cracking the QRadar certification exam.

Get started and Avail your dream job as an security analyst.

Features

✅Lifetime access ✅Lifetime video access
✅Real-time case studies ✅The project integrated into the Curriculum
✅24*7 Support from our team of administrators

Course Content

1.Introduction to SOC

  • Building a successful SOC
  • Functions of SOC
  • Heart of SOC- SIEM
  • Gartner’s magic quadrant

2.Introduction to Qradar

  • IBM QRadar SIEM component architecture and data flows
  • Using the QRadar SIEM User Interface

3.Working with logs

  • Working with offense triggered by events
  • Working with offense triggered by flows
  • Working with events of an offense

4.Monitoring

  • Monitor QRadar Notifications and error messages.
  • Monitor QRadar performance
  • Review and interpret system monitoring dashboards.
  • Investigate suspected attacks and policy breaches
  • Search, filter, group, and analyze security data

5.Intercep

  • Investigate the vulnerabilities and services of assets
  • Investigate events and flows
  • Use index management
  • Index and Aggregated Data Management
  • Use AQL for advanced searches
  • Creating Alerts for intrusions
  • Explain error messages and notifications.
  • Analyze a Real-World Scenario.
  • Creating Reports
  • Case Studies

6.Advanced Topics

  • Creating log source types
  • Leveraging reference data collections
  • Developing custom rules
  • Creating Custom Action Scripts
  • Developing Anomaly Detection Rules

FAQ’s

(more…)

Web Application Penetration Testing Training

Web Application Penetration Testing Training

⏰24 hours | ▶️ 24 Videos | 📣 9173 Participants | 🎓 3149 Reviews | 4.8 ⭐⭐⭐⭐⭐

Choose a Plan that Works for You

Upcoming Batches PST

 Weekday 

June 11(1 HR A DAY)
07:00 PM PST
Enroll Now  →

 Weekday 

June 25(1 HR A DAY)
07:30 AM IST
Enroll Now  →

 Weekend

June 28(1 HR A DAY)
07:00 PM PST
Enroll Now  →

Upcoming Batches IST

 Weekday 

June​​ 12(1 HR A DAY)
07:30 AM IST
Enroll Now  →

 Weekday 

June 25(1 HR A DAY)
07:30 PM IST
Enroll Now  →

 Weekend 

June 29(1 HR A DAY)
07:30 AM IST
Enroll Now  →

Course Description

Get Web Application Penetration Testing training classes and grab knowledge regarding the technology that promotes business success.

It plays a vital role in setting a target for cybercriminals. Web software penetration trying out offerings proactively examine packages to perceive vulnerabilities, together with the ones that might result in the lack of touchy consumer and economic information.

As this is one of the best developing security tools, it would be the best choice anyone could make to join our online classes and self-paced tutorials.

Join schooling now and analyze this strong generation and snatch the direction completion. Upgrade your technical talents accordingly.

Also, the pay for those professions may be astounding as those are the maximum desired streams in It cloud management. So to get professional guidance and excellent placements get with us now.

Features

✅Lifetime access ✅Lifetime video access
✅Real-time case studies ✅The project integrated into the Curriculum
✅24*7 Support from our team of administrators

Course Content

1.Web Application Assessment

  • OWASP Top 10 Vulnerabilities
  • Threat Modelling Principle
  • Site Mapping & Web Crawling
  • Server & Application Fingerprinting
  • Identifying the entry points
  • Page enumeration and brute forcing
  • Looking for leftovers and backup files

2.Authentication vulnerabilities

  • Authentication scenarios
  • User enumeration
  • Guessing passwords – Brute force & Dictionary attacks
  • Default users/passwords
  • Weak password policy
  • Direct page requests
  • Parameter modification
  • Password flaws
  • Locking out users
  • Lack of SSL at login pages
  • Bypassing weak CAPTCHA mechanisms
  • Login without SSL

3.Web Agent Installation

  • Web Agent Model
  • Preparing for Web Agent installation
  • Install the Web Agent
  • Unattended installs
  • Settings Added to Web Server
  • Test the Web Agent
  • Troubleshooting
  • Unix Installation Review

4.Authorization vulnerabilities

  • Role-based access control (RBAC)
  • Authorization bypassing
  • Forceful browsing
  • Client-side validation attacks
  • Insecure direct object reference

5.Improper Input Validation & Injection vulnerabilities

  • Input validation techniques
  • Blacklist VS. Whitelist input validation bypassing
  • Encoding attacks
  • Directory traversal
  • Command injection
  • Code injection
  • Log injection
  • XML injection – XPath Injection | Malicious files | XML Entity
  • bomb
  • LDAP Injection
  • SQL injection
  • Common implementation mistakes – authentication
  • Bypassing using SQL Injection
  • Cross Site Scripting (XSS)
  • Reflected VS. Stored XSS
  • Special chars – ‘ &<>, empty

6.Insecure file handling

  • Path traversal
  • Canonicalization
  • Uploaded files backdoors
  • Insecure file extension handling
  • Directory listing
  • File size
  • File type
  • Malware upload

7.Session& browser manipulation attacks

  • Session management techniques
  • Cookie based session management
  • Cookie properties
  • Cookies – secrets in cookies, tampering
  • Exposed session variables
  • Missing Attributes – httpOnly, secure
  • Session validity after logoff
  • Long session timeout
  • Session keep alive – enable/disable
  • Session id rotation
  • Session Fixation
  • Cross Site Request Forgery (CSRF) – URL Encoding
  • Open redirect

8.Information leak

  • Web Services Assessment
  • Web Service Testing
  • OWASP Web Service Specific Testing
  • Testing WSDL
  • Sql Injection to Root
  • LFI and RFI]
  • OWASP Top 10 Revamp

FAQ’s

(more…)

Network Penetration Testing Training

Network Penetration Testing Training

⏰24 hours | ▶️ 24 Videos | 📣 10628 Participants | 🎓 4381 Reviews | 4.7 ⭐⭐⭐⭐⭐

Choose a Plan that Works for You

Upcoming Batches PST

 Weekday 

June 10(1 HR A DAY)
07:00 PM PST
Enroll Now  →

 Weekday 

June 25(1 HR A DAY)
07:00 AM PST
Enroll Now  →

 Weekend

June 21(1 HR A DAY)
07:00 PM PST
Enroll Now  →

Upcoming Batches IST

 Weekday 

June​ 11(1 HR A DAY)
07:30 AM IST
Enroll Now  →

 Weekday 

June 25(1 HR A DAY)
07:30 PM IST
Enroll Now  →

 Weekend 

June 22(1 HR A DAY)
07:30 AM IST
Enroll Now  →

Course Description

Get Network Penetration Testing Training classes and gain course completion on the technology that identifies security issues before hackers can exploit them.

It is also known as pen trying out. A cyber-protection workout is performed to use specialists to locate and exploit vulnerabilities in an organization’s IT infrastructure.

Join our online classes to learn about the security tool that checks the weak points of the system software prone to cyber-attacks.

Start Learning this generation in online classes and online assets of tutorials and benefit a grip in this device via understanding from the fundamentals.

Our skilled trainers will assist you via entirety and manual you to get the certification and accumulate pinnacle companies’ placement.

Get the course completion and guidance to get Network Penetration Testing certification and get yourself into the best MNC.

Features

✅Lifetime access ✅Lifetime video access
✅Real-time case studies ✅The project integrated into the Curriculum
✅24*7 Support from our team of administrators

Course Content

1.Introduction

  • TCP/IP Packet Analysis
  • Overview of Network Security
  • Port and Protocols & Analysis
  • Linux Server Installation
  • Windows Client / Linux Installation
  • Basic commands (Windows / Linux)
  • Kali Linux Installation

2.Wireshark

  • Introduction
  • ICMP Packet Analysis
  • ARP Packet Analysis
  • 3 way handshake Analysis
  • Tracert Command Analysis
  • Packet Forensics
  • Nmap Packet Forensics

3.NMAP Basics

  • Network Sweeping
  • OS Discovery
  • SYN Scan
  • UDP Scan
  • XMAS Scan
  • FIN Scan
  • NULL Scan

4.Nmap Firewall Scan

  • Fragment Scan
  • Data Length Scan
  • TTL Scan
  • Source Port Scan
  • Decoy Scan
  • Spoof IP Scan
  • Spoof MAC Scan
  • Data String Scan
  • Hex String Scan
  • IP Options Scan

5.Metasploit

  • Metasploit Basic
  • Msfvenom
  • Auxiliary scanner
  • Windows Reverse TCP
  • Windows HTTPS Tunnel
  • Hidden Bind TCP
  • Macro Payloads
  • Shell on the Fly (Transport)
  • Bypass User Access Control
  • Pass the Hash
  • Post Exploitation

6.Dictionary & Passwords Attacks

  • Hydra
  • Medussa
  • Crunch
  • CeWL
  • WCE
  • Mimikatz
  • cUPP
  • Online attacks

7.FTP Penetration Testing (Port 21)

  • Introduction & Lab setup
  • Banner Grabbing/Banner Hiding
  • Port forwarding /Time Scheduling
  • Brute forcing/Secure
  • Pivoting/Tunneling [windows]

8.SSH Penetration Testing (Port 22)

  • Introduction & Lab setup
  • Banner Grabbing/Banner Hiding
  • Port forwarding /Time Scheduling
  • Brute forcing/Secure
  • Pivoting/Tunneling
  • Multiple way to secure ssh

9.Telnet Penetration Testing (Port 23)

  • Introduction & Lab setup
  • Banner Grabbing/Banner Hiding
  • Port forwarding /Time Scheduling
  • Brute forcing/Secure
  • Pivoting/Tunneling

10.SMTP Penetration Testing (Port 25)

  • Introduction & Lab setup
  • Banner Grabbing/Banner Hiding
  • Port forwarding /Time Scheduling
  • Brute forcing/Secure
  • Penetration testing with SWAKS

11.DNS & DHCP Penetration Testing (Port 53, 67, 68)

  • Introduction & Lab setup
  • DNS Enumeration
  • DHCP Packet Analysis with Wireshark
  • DHCP Starvation attack
  • Rogue DHCP Server
  • Tools (Gobbler, responder, Yersinia)

12.NetBIOS & SMB Penetration Testing (Port 135-445)

  • Introduction & Lab setup
  • SMB Enumeration
  • SMB Null Sessions
  • Enum4Linux
  • NetBIOS Spoofing
  • Banner Grabbing/Banner Hiding
  • Brute forcing/Secure
  • Pivoting/Tunneling
  • Penetration Testing with (PS exec, eternal blue )
  • Multiple way to connect smb

13.SNMP Penetration Testing (Port 161, 162)

  • Introduction & Lab setup
  • Banner Grabbing/Banner Hiding
  • Port forwarding /Time Scheduling
  • Brute forcing/Secure
  • Penetration Testing with Metasploit and Nmap

14.MSSQL Penetration Testing (Port 1433)

  • MSSQL Brute force Attack
  • Enumerate MSSQL configuration setting
  • Identifying SQL Server logins
  • Identify Database owner
  • Identify a User With masquerade privilege
  • Execute SQL Statement
  • Retrieve MSSQL Password Hashes of Users
  • Decode Password Hashes of Users
  • Extracting MYSQL Schema Information

15.MySQL Penetration Testing (Port 3306)

  • Introduction and Lab setup
  • MYSQL Brute Force Attack
  • mysql banner user/file/ Enumeration
  • Stealing MYSQL information
  • Check File Privileges
  • Enumerate MYSQL writeable directories
  • Extract MYSQL Username with Hash Password
  • Crack Hash Password with John the Ripper
  • Secure MYSQL through port forwarding
  • Prevent Mysql against brute force attack

16.Remote Desktop Penetration Testing (Port 3389)

  • Introduction & Lab setup
  • Banner Grabbing/Banner Hiding
  • Port forwarding /Time Scheduling
  • Brute forcing/Secure
  • Pivoting/Tunneling
  • DOS Attack

17.VNC Penetration Testing (Port 5900, 5901)

  • Introduction & Lab setup
  • Banner Grabbing/Banner Hiding
  • Port forwarding /Time Scheduling
  • Brute forcing/Secure
  • Penetration Testing with Metasploit and Nmap
  • Pivoting/Tunneling

18.Sniffing & Spoofing

  • Introduction
  • ARP Poisoning
  • MAC Address Snooping
  • DNS Spoofing
  • DNS Poisoning
  • Capture NTLM Hashes
  • Xerosploit

19.Socks Proxy Penetration Testing

  • Socks proxy lab setup
  • SSH
  • FTP
  • HTTP

20.IDS, Firewall, Honeypots

  • Setup Snort Lab in Ubuntu
  • Understanding Snort Rules
  • Introduction to IPtables
  • Introduction to Windows Firewall
  • ICMP Detect
  • TCP Packet Detect
  • Detect Nmap Scan
  • Detect Dos Attack
  • Antivirus Evasion with veil

21.DOS Attack Penetration Testing

  • Introduction to DOS Attack
  • Botnet
  • D-DOS Attack
  • SYN Flood Attack
  • UDP Flood
  • Smurf Attack
  • Packet Crafting
  • Others DOS Attack Tools

22.Social Engineering Attack

  • Introduction to Social Engineering Attack
  • Payload and Listener Attack
  • Java Applet Attack
  • HTA Attack
  • MSFPC
  • DOS Attack
  • PowerShell Attack Vector
  • VNC Attack

23.Covering Tracks & Maintaining access

  • Persistence
  • s4u_persistence
  • VSS_Persistence
  • Registry Persistence
  • Netcat
  • Clear Event Logs

24.Network Vulnerability Assessment Tool

  • Nessus
  • GFI Languard
  • Nexpose
  • Openvas
  • MBSA

FAQ’s

(more…)

Mitre Attck Training

Mitre Attck Training

⏰24 hours | ▶️ 24 Videos | 📣 10625 Participants | 🎓 4701 Reviews | 4.8 ⭐⭐⭐⭐⭐

Choose a Plan that Works for You

Upcoming Batches PST

 Weekday 

June ​11(1 HR A DAY)
07:30 AM IST
Enroll Now  →

 Weekday 

June 27(1 HR A DAY)
06:00 AM PST
Enroll Now  →

 Weekend

June 21(1 HR A DAY)
06:00 PM PST
Enroll Now  →

Upcoming Batches IST

 Weekday 

June ​11(1 HR A DAY)
07:30 PM IST
Enroll Now  →

 Weekday 

June 27(1 HR A DAY)
07:30 PM IST
Enroll Now  →

 Weekend 

June 22(1 HR A DAY)
07:30 AM IST
Enroll Now  →

Course Description

Start MITRE ATT&CK training in live sessions and know about Set of strategies utilized by adversaries to perform a selected objective. Those targets are labeled as processes with inside the ATT&CK Matrix.

It is a curated expertise base and version for cyber adversary behavior, reflecting the diverse stages of an adversary’s assault lifecycle and the systems they’re recognized to target.

Start online classes and learn about achieving the tactical goals and adversary usage of regulations and metadata.

Get your online classes for mastering this framework device that is one of the maximum advancing generations.

Start Learning this generation online and online assets of tutorials and benefit a grip in this device by understanding the fundamentals.

Our skilled running shoes will assist you via the path of entirety and manual you to get MITRE ATT&CK certification and gather pinnacle companies’ placement.

Features

✅Lifetime access ✅Lifetime video access
✅Real-time case studies ✅The project integrated into the Curriculum
✅24*7 Support from our team of administrators

Course Content

1.Introduction to MITRE ATT&CK

MITREAtt&ck – Cyber Att&ck Lifecycle
Pyramid of pain
Cyber Kill Chain
Threat Intelligence using MITREAtt&ck

2.MITRE’s ATT&CK Matrices

  • MITRE PRE-ATT&CK threat modelling methodology for pre-exploit activities
  • Enterprise Matrix: Windows, MacOS, Linux, Etc.
  • Mobile
  • ICS.

3.Mapping Data to ATT&CK

ATT&CK portable detection tests
Raw Data vs Finished Reports
Case Studies.

4.Storing &Analyzing the ATT&CK Mapped Data

MITRE ATT&CK Navigator
Utilizing the MITRE ATT&CK Matrix
MITRE ATT&CK Use Cases
Warming Up Using ATT&CK for Self-Advancement.

5.Defend with MITRE ATT&CK

Concept of Active Defense
MITRE SHIELD
Defensive Recommendation with SHIELD
MITRE CAR
Getting started using MITRE ATT&CK for Threat Hunting
Different TTP’s on attacking Active Directory

6.Red Team Emulation

Set up MITRE Caldera
Atomic Red Team Test
MITRE LAB Practical.

FAQ’s

(more…)

CTF Training

CTF Training

⏰24 hours | ▶️ 24 Videos | 📣 9435 Participants | 🎓 4318 Reviews | 4.8 ⭐⭐⭐⭐⭐

Choose a Plan that Works for You

Upcoming Batches PST

 Weekday 

June 10(1 HR A DAY)
07:00 PM PST
Enroll Now  →

 Weekday 

June 26(1 HR A DAY)
07:00 AM PST
Enroll Now  →

 Weekend

June 28(1 HR A DAY)
07:00 PM PST
Enroll Now  →

Upcoming Batches IST

 Weekday 

June 11(1 HR A DAY
07:30 AM IST
Enroll Now  →

 Weekday 

June ​26(1 HR A DAY)
07:30 PM IST
Enroll Now  →

 Weekday 

June 29(1 HR A DAY)
07:00 AM PST
Enroll Now  →

Course Description

Capture the Flag Training (CTF) is for candidates willing to master in a 
Cyber Security competition with challenges. The participants will have a 

variety of tasks related to computer security problems. 

CTF Course is the best fit for the candidates interested in Ethical 
Hacking and Penetration testing skills recommended to have firm 

understanding of the TCP and IP protocols. 

You can enroll in this course and start learning the course through 

online classes. 

After learning this course, you will have many job opportunities to work 

in Ethical Hacking or IT security.  

You can get the Course Completion Certificate as soon as you complete 
the course. 

Features

✅Lifetime access ✅Lifetime video access
✅Real-time case studies ✅The project integrated into the Curriculum
✅24*7 Support from our team of administrators

Course Content

1.Introduction to Pentesting

  • Penetration Testing Benefits
  • Types of Penetration Testing
  • Penetration Testing Methodologies
  • Law & Compliance
  • Planning, Managing & Reporting

2.Assessment & Skill Management

  • Finding Files
  • Services in Kali
  • SSH Service
  • FTP Services
  • HTTP Service
  • SNMP Service
  • Mysql Services
  • Service Management
  • IP Protocols, Networking Protocols, IPSec, VOIP
  • Network Architecture, Mapping & Target Identification

3.Basic Linux and Commands

  • Locate
  • Which
  • Find
  • Sed
  • Awk
  • Cut
  • Sort
  • Grep
  • Head
  • Tail
  • Wget
  • Cat

4.Netcat Tutorials

  • Getting start with NC
  • Connecting to a Server
  • Fetching HTTP header
  • Chatting
  • Creating a Backdoor
  • Verbose Mode
  • Save Output to Disk
  • Port Scanning
  • TCP Delay Scan
  • UDP Scan
  • Reverse TCP Shell Exploitation
  • Randomize Port
  • File Transfer
  • Reverse Netcat Shell Exploitation
  • Banner grabbing

5.Port Scanning with Nmap & WireShark

  • TCP Connect Scan with wireshark
  • Network sweeping with wireshark
  • SYN Scan with wireshark
  • UDP Scan with wireshark
  • FIN Scan with wireshark
  • Null Scan with wireshark
  • OS Discovery with wireshark
  • NSE Scripts with wireshark
  • Nmap Firewall Scan

6.Enumeration

  • Overview
  • Structure, interpretation and analysis of DNS records
  • DNS Enumeration
  • Forward DNS Lookup
  • Reverse DNS Lookup
  • Zone Transfers
  • NetBIOS & SMB Enumeration
  • Null Sessions
  • Enum4Linux
  • SMB NSE Scripts
  • MYSQL Enumeration
  • MSSQL Enumeration
  • SMTP Enumeration
  • VRFY Script
  • Python Port
  • SNMP Enumeration
  • SNMP MiB
  • SNMPWalk

7.Passive Info Gathering

  • Overview
  • Google Search
  • Google Hacking
  • GHDB
  • NNTP Newsgroups & Information Leakage from Mail Headers

8.Directory Bruteforce Attack

  • Dirb
  • Dirbuster
  • Dirsearch
  • Metasploit

9.Windows Security Assessment

  • Domain Reconnaissance
  • User Enumeration
  • Active Directory
  • Windows Patch Management Strategies
  • Desktop Lockdown & Exchange Server

10.Reverse Shell

  • Php reverse shell
  • Python reverse shell
  • Perl reverse shell
  • Bash reverse shell
  • Msfvenom shell

11.Intro to Overflows

  • Overview
  • Vulnerable Code
  • Stack Overflow
  • Heap Overrun/Overflow

12.Windows BO Example

  • Overview DEP, ASLR and CFG
  • Fuzzing
  • Crash Replication
  • Controlling EIP
  • Locating space for our Shellcode
  • Bad Characters
  • Redirecting Execution
  • Introducing Mona
  • Shellcode Payload

13.Linux BO Example

  • Overview DEP, ASLR and Canaries
  • Controlling EIP
  • Locating Space
  • First Stage Shellcode
  • Locating RET
  • Generating Shellcode

14.Using Public Exploits

  • Overview
  • Finding Exploits
  • Exploit-DB
  • Fixing Exploits 1
  • Fixing Exploits 2
  • Cross-Compiling

15.File Transfers

  • FTP
  • Python HTTP Server
  • php http server
  • HFS Tool
  • Netcat
  • CURL
  • Wget
  • TFTP
  • Python SMB Server
  • Powershell File Transfer
  • Bitsadmin

16.Linux Privilege Escalation

  • Suid Binaries
  • AbsuingSudo’s Right
  • Kernel Exploit
  • Path Variables
  • Multiple Ways to edit /etc/passwd file

17.Linux Privilege Escalation

  • Suid Binaries
  • AbsuingSudo’s Right
  • Kernel Exploit
  • Path Variables
  • Multiple Ways to edit /etc/passwd file

18.Windows Privilege Escalation

  • Weak File Permissions
  • Always Install Elevated
  • Bypass UAC
  • Unquoted Service Path
  • Kernel Exploits

19.Web Application Attacks

  • Overview
  • Web Servers Flaws
  • Web Protocols
  • Local File Inclusion
  • SQL Injection
  • Authentication Bypass
  • Error Based Enum
  • Blind SQL Injection
  • Attack Proxies
  • XSS, LDAP & XML Injection
  • SQLMap
  • Web APIs
  • Web Sub-Components

20.Password Cracking

  • Overview
  • Crunch
  • Passing the Hash
  • Password Profiling
  • Online Attacks
  • Medusa
  • Ncrack
  • Hydra
  • Password Hashes
  • Cracking Hashes
  • LM / NTLM

21.Port Fun

  • Overview
  • Port Forwarding
  • SSH Tunnels
  • Dynamic Proxies
  • Proxy Chains

22.Metasploit Framework

  • Overview
  • AUX Modules
  • SNMP Modules
  • SMB Modules
  • WEBDAV Modules
  • Database Services
  • Exploits
  • Payloads
  • Meterpreter
  • Meterpreter in Action
  • Additional Payloads
  • Binary Payloads
  • Multihandler
  • Porting Exploits
  • Post Exploitation

23.Antivirus Avoidance

  • Overview
  • Shellter
  • Veil-Evasion
  • thefatrat

24.Misconfigured Lab Setup

  • WordPress lab Setup & Pentesting
  • Joomla Lab Setup & Pentesting
  • Drupal Lab Setup & Pentesting

FAQ’s

(more…)