EC-Council’s Certified Chief Information Security Officer Program has empowered information security professionals to achieve their professional goals across the globe. It is a program developed and delivered by seasoned security executives. It equips future executives with business and technical knowledge so they can succeed at the highest levels of the security industry. The Program is designed by seasoned CISOs to help train professionals in the business of security. The Certified CISO Program is a global community of security leadership focused on delivering security capabilities aligned to the business.

ادامه مطلب

This course covers about how security works in iOS devices and how vulnerabilities can be found in iOS applications.

The course starts with the basics of how you can set up your hacking environment and then gradually moves on to how security works in iOS Applications.

The course also shows you the different types of Jailbreak and how you can Jailbreak your iOS Device.

The course also covers OWASP Mobile Top 10 and would cover all the categories of OWASP Mobile Top 10 with practical examples.

The course also includes a detailed overview of iOS Security such as Keychain, Device Management, Data Protection etc.

The major section of iOS Pentesting is the Static and the Dynamic Analysis where most of the vulnerabilities would be covered with practical approaches. These approaches can also be used to find vulnerabilities in bug bounty programs.

At the end of the course, you would be exposed to certain Tips and Tricks that will make your upgrade iOS Pentesting skills. These tips will help you to differentiate yourself from others.

This course also includes the Breakdown of some Hackerone Reports which are found and submitted by other hackers for better understanding.

ادامه مطلب

Windows System Programming: Fundamentals course will take you through the basics of getting started with system programming on Windows.

ادامه مطلب

In this course, we will understand the basics of Windows processes, virtual memory and different techniques to enumerate processes. Then we will look at the fundamentals of process injection and try out techniques like remote Thread Injection, APC, Thread Hijacking and Process Hollowing.

This course is very practical with code examples to illustrate each technique!

ادامه مطلب

This course will familiarize students with all aspects of writing Assembly code on the ARM platforms. By the end of this course students will be able to understand and write Assembly programs on the ARM platform. This includes being able to understand programs that were created by a high level language compiler. This course is fundamental for  anyone wishing to do reverse engineering on the ARM platforms. The BeagleBone family of boards is used in this course.

ادامه مطلب

Many organizations deploy private registry servers in their internal/external application development/deployment environment. Unfortunately, most often, these servers are not securely deployed. In this entirely lab based course, we will look at various configurational vulnerabilities in docker registry servers. In these labs we have used common deployment architectures of a registry server and shown how an attacker can get valuable information out of images stored on the server.

ادامه مطلب