Description
Prerequisites:
- Basic understanding of computers
- Basic understanding of internet
Time Duration:
- It usually takes around 24 days before you can take the final challenge and earn the HCSP 0x01 certificate !
Future of HCSP – 0x01
- 3.5 LPA (Highest salary offered)
- 5,000+ Jobs (Source: LinkedIn Jobs)
Lab access and examination:
- 12 days lab access
- You can attempt the exam only after completing the lab access time.
- Final challenge should be attempted within 40 days of course purchase
Course Module
- Module 01 – Introduction to Cyber Security
- Defining what is hacking and how it is different from ethical hacking.
- Case Studies of Hacking Incidents which led to massive destruction and how could it have been prevented.
- What are the types of Hacker?
- Generic Terms of Information security industry.
- Hacking Phases
- Module 02 – Digital footprinting and Reconnaissance
- What is Reconnaissance? What are the different types of Recon methods?
- How to build own recon methodology?
- How to use google dorking to gain useful information which can be leveraged while exploitation.
- Hands-on Tasks for performing recon on live targets.
- Visiting Hacker’s Favourite Search Engine.
- Discussion on how Internet Never Forgets
- Securing Your Digital Identity.
- Module 03 – Open Source Intelligence
- What is Open Source Intelligence
- Different techniques to perform OSINT
- Performing OSINT on live targets & In house CTF Labs
- Module 04 – Dark web and Dark net, Beng Anonymous
- What is Dark Web, Deep Web and Dark Net?
- How do we work on these portals while securing our own identities.
- Understanding of TOR protocol.
- How to make fake identity and use that identity to surf over Internet.
- Hosting your own Web Site on Dark Web.
- How to own a custom subdomain for Dark Web Hosted Site.
- Module 05 – Scanning and Enumeration
- What is Scanning?
- Different Methods to scan your target system.
- How to make a network map.
- Necessary Networking Concepts
- What is Enumeration?
- Different tools & Techniques to perform enumeration.
- Overview of Vulnerability of subdomain takeover.
- Hands-On Lab to apply learnt techniques.
- Module 06 – Firewall, IDS and IPS, Honeypot
- What is Firewall? Understand its working.
- What is IDS? Understand its working.
- What is IPS? Understand its working.
- What are Honeypots? Understand its working.
- How to bypass these security controls and perform scanning on target systems.
- Module 07 – DoS and DDoS Attack
- What is Dos attack?
- What is DDOS attack?
- What is the difference b/w the two?
- How a malicious hackers performs these attack.
- Module 08 – System hacking and Password Cracking
- Understanding what are the different types of users and overview of generic system vulnerabilities.
- How to gain access to the system (Getting a Shell)?
- How to escalate privileged using some common system vulnerabilities.
- Discuss various techniques to crack passwords.
- Hands-On lab for performing System hacking & Password Cracking.
- Module 09 – Cryptography and Crypto-Money
- What is Cryptography?
- What is Crypto-Money?
- How Cryptography has secured digital Identity.
- How Cryptography is implemented in technology these days.
- How to analyse the cryptographic string and decipher it.
- Hand-On Lab on Cryptography.
- Module 10 – Wireless Hacking Overview
- What is Wireless technology and their bifurcations?
- Different Wireless Technology used these days.
- Common Vulnerabilities with wireless technology.
- Hands-On lab on wireless hacking.
- Module 11 – Web Server and Web Application hacking
- Perform recon on web targets.
- Perform Vulnerability Assessment.
- Using Web Debugger
- Setting Up Burp Suite
- Exploit SQL injection with customized payloads
- Exploit Cross Site Scripting with customized payloads.
- Module 12 – Windows Exploitation
- Apply System Hacking techniques on hacking a windows machine
- Hands-On lab
- Module 13 – Linux Exploitation
- Apply System Hacking techniques on hacking a Linux machine
- Hands-On lab
- Module 14 – Hacking Persistence and Backdoor Implementation
- What is persistence?
- How a hacker makes persistence?
- Different Methodology of Persistence.
- What is a Backdoor?
- How can we make our own backdoor and maintain persistence.
- Module 15 – Malware and APT
- What is a malware
- Different types of malware
- How Malware Engineering is done
- Tools & Techniques to build malware.
- Case Studies of Malware
- What is an APT?
- Different APT techniques
- Discussion on different APT teams across the globe
- Case Studies of APT.
- Module 16 – Clearing your Identity
- What is Logs?
- What traces a hacker leaves behind and how a hacker can be caught
- How to clear our identity from the exploited system.
- Module 17 – Reverse Engineering and Buffer overflow
- What is difference b/w Engineering and Reverse Engineering
- Reversing a Mobile Applications with Hands-On Lab.
- Different techniques used to reverse engineer.
- What is buffer overflow?
- How it can be leveraged to exploit a target system (Overview).
- Module 18 – IoT and Cloud Computing overview
- What is an IoT Device
- Working Mechanism of IoT Device
- Reversing of an IoT device firmware (Hand-on Lab)
- What is Cloud computing?
- Why there is a boom in cloud computing space
- Different attack vectors of cloud.
Reviews
There are no reviews yet.