Hackershala

Hackershala Certified Security Professional – 0x01

12,000.00

Category

Description

Prerequisites:
  • Basic understanding of computers
  • Basic understanding of internet
Time Duration:
  • It usually takes around 24 days before you can take the final challenge and earn the HCSP 0x01 certificate !

Future of HCSP – 0x01

  • 3.5 LPA (Highest salary offered)
  • 5,000+ Jobs (Source: LinkedIn Jobs)
Lab access and examination:
  • 12 days lab access
  • You can attempt the exam only after completing the lab access time.
  • Final challenge should be attempted within 40 days of course purchase
Course Module
  • Module 01 – Introduction to Cyber Security
    • Defining what is hacking and how it is different from ethical hacking.
    • Case Studies of Hacking Incidents which led to massive destruction and how could it have been prevented.
    • What are the types of Hacker?
    • Generic Terms of Information security industry.
    • Hacking Phases
  • Module 02 – Digital footprinting and Reconnaissance
    • What is Reconnaissance? What are the different types of Recon methods?
    • How to build own recon methodology?
    • How to use google dorking to gain useful information which can be leveraged while exploitation.
    • Hands-on Tasks for performing recon on live targets.
    • Visiting Hacker’s Favourite Search Engine.
    • Discussion on how Internet Never Forgets
    • Securing Your Digital Identity.
  • Module 03 – Open Source Intelligence
    • What is Open Source Intelligence
    • Different techniques to perform OSINT
    • Performing OSINT on live targets & In house CTF Labs
  • Module 04 – Dark web and Dark net, Beng Anonymous
    • What is Dark Web, Deep Web and Dark Net?
    • How do we work on these portals while securing our own identities.
    • Understanding of TOR protocol.
    • How to make fake identity and use that identity to surf over Internet.
    • Hosting your own Web Site on Dark Web.
    • How to own a custom subdomain for Dark Web Hosted Site.
  • Module 05 – Scanning and Enumeration
    • What is Scanning?
    • Different Methods to scan your target system.
    • How to make a network map.
    • Necessary Networking Concepts
    • What is Enumeration?
    • Different tools & Techniques to perform enumeration.
    • Overview of Vulnerability of subdomain takeover.
    • Hands-On Lab to apply learnt techniques.
  • Module 06 – Firewall, IDS and IPS, Honeypot
    • What is Firewall? Understand its working.
    • What is IDS? Understand its working.
    • What is IPS? Understand its working.
    • What are Honeypots? Understand its working.
    • How to bypass these security controls and perform scanning on target systems.
  • Module 07 – DoS and DDoS Attack
    • What is Dos attack?
    • What is DDOS attack?
    • What is the difference b/w the two?
    • How a malicious hackers performs these attack.
  • Module 08 – System hacking and Password Cracking
    • Understanding what are the different types of users and overview of generic system vulnerabilities.
    • How to gain access to the system (Getting a Shell)?
    • How to escalate privileged using some common system vulnerabilities.
    • Discuss various techniques to crack passwords.
    • Hands-On lab for performing System hacking & Password Cracking.
  • Module 09 – Cryptography and Crypto-Money
    • What is Cryptography?
    • What is Crypto-Money?
    • How Cryptography has secured digital Identity.
    • How Cryptography is implemented in technology these days.
    • How to analyse the cryptographic string and decipher it.
    • Hand-On Lab on Cryptography.
  • Module 10 – Wireless Hacking Overview
    • What is Wireless technology and their bifurcations?
    • Different Wireless Technology used these days.
    • Common Vulnerabilities with wireless technology.
    • Hands-On lab on wireless hacking.
  • Module 11 – Web Server and Web Application hacking
    • Perform recon on web targets.
    • Perform Vulnerability Assessment.
    • Using Web Debugger
    • Setting Up Burp Suite
    • Exploit SQL injection with customized payloads
    • Exploit Cross Site Scripting with customized payloads.
  • Module 12 – Windows Exploitation
    • Apply System Hacking techniques on hacking a windows machine
    • Hands-On lab
  • Module 13 – Linux Exploitation
    • Apply System Hacking techniques on hacking a Linux machine
    • Hands-On lab
  • Module 14 – Hacking Persistence and Backdoor Implementation
    • What is persistence?
    • How a hacker makes persistence?
    • Different Methodology of Persistence.
    • What is a Backdoor?
    • How can we make our own backdoor and maintain persistence.
  • Module 15 – Malware and APT
    • What is a malware
    • Different types of malware
    • How Malware Engineering is done
    • Tools & Techniques to build malware.
    • Case Studies of Malware
    • What is an APT?
    • Different APT techniques
    • Discussion on different APT teams across the globe
    • Case Studies of APT.
  • Module 16 – Clearing your Identity
    • What is Logs?
    • What traces a hacker leaves behind and how a hacker can be caught
    • How to clear our identity from the exploited system.
  • Module 17 – Reverse Engineering and Buffer overflow
    • What is difference b/w Engineering and Reverse Engineering
    • Reversing a Mobile Applications with Hands-On Lab.
    • Different techniques used to reverse engineer.
    • What is buffer overflow?
    • How it can be leveraged to exploit a target system (Overview).
  • Module 18 – IoT and Cloud Computing overview
    • What is an IoT Device
    • Working Mechanism of IoT Device
    • Reversing of an IoT device firmware (Hand-on Lab)
    • What is Cloud computing?
    • Why there is a boom in cloud computing space
    • Different attack vectors of cloud.

Reviews

There are no reviews yet.

Be the first to review “Hackershala Certified Security Professional – 0x01”

Your email address will not be published. Required fields are marked *

Open chat
1
Hello,
How we can help you?