برچسب: Pentest

EC-Council’s Web Application Hacking and Security is a specialization certification that enables the cybersecurity workforce to learn, hack, test, and secure web applications from existing and emerging security threats in the industry verticals. Understand, Exploit, And Defend Yourself Against Topmost Web Vulnerabilities With A Comprehensive Hands-On, Lab-Based, Guided, Mastery Course Designed By The Team That Brought You CEH

  • Advanced Web Application Penetration Testing
  • Advanced SQL Injection (SQLi)
  • Reflected, Stored and DOM-based Cross Site Scripting (XSS)
  • Cross Site Request Forgery (CSRF) – GET and POST Methods
  • Server-Side Request Forgery (SSRF)
  • Security Misconfigurations
  • Directory Browsing/Bruteforcing
  • CMS Vulnerability Scanning
  • Network Scanning
  • Auth Bypass
  • Web App Enumeration
  • Dictionary Attack
  • Insecure Direct Object Reference Prevention (IDOR)
  • Broken Access Control
  • Local File Inclusion (LFI)
  • Remote File Inclusion (RFI)
  • Arbitrary File Download
  • Arbitrary File Upload
  • Using Components with Known Vulnerabilities
  • Command Injection
  • Remote Code Execution
  • File Tampering
  • Privilege Escalation
  • Log Poisoning
  • Weak SSL Ciphers
  • Cookie Modification
  • Source Code Analysis
  • HTTP Header modification
  • Session Fixation
  • Clickjacking

EC-Council Web Application Hacking and Security

ادامه مطلب

This course teaches the foundations of satellite cybersecurity by guiding you through the reconnaissance, communication dissection, decoding, and vulnerability analysis of satellite systems through interactive activities and tutorials. Learn about the underlying concepts of what makes satellite network infrastructure function and apply your knowledge to conduct digital forensics on real life satellites in orbit.

Syllabus

Satellite Reconnaissance

Communication Analysis and Eavesdropping

Reverse Engineering and Decoding Communication

Vulnerabilities and Attacks

Aerospace Cybersecurity: Satellite Hacking (W53)

ادامه مطلب

In this course you will set up EC-Council’s Mobile Security Toolkit (STORM) OS to interface with your drone, then learn about drone hacking. This will include a wide arrange of topics from the basics of drones and the FCC rules, to the capture, examination, and exploitation of drone data.

Syllabus

Technical Introduction Drone Hacking
Core UAV Technology
UAV Robotics as an ecosystem
Wireless Recon
Drone Hacking

EC-Council: Drone Hacking Workshop

ادامه مطلب

This is an on-demand full hands-on training that focuses on developing cyber weapons that can evade AV detection, EDR logs and forensics traces like how advanced targeted attacks do, and provide you with insights on how to improve your organization’s overall detections and security posture.

ادامه مطلب

Cybersecurity ATTACK & DEFENSE: The Foundations, is a comprehensive training program designed to provide the fundamental skills and roadmap needed for a successful career in cybersecurity. The course is divided into three main modules:

ATTACK: This module teaches how elite hackers infiltrate the world’s most secure networks, providing a foundation for careers in penetration testing and red team operations.
RESPOND: This module focuses on how cybersecurity experts protect their organizations against advanced attacks. It covers essential skills for working in incident response and threat hunting.
INVESTIGATE: This module instructs on how to perform a deep investigation of targeted attacks’ tools and malware, including static and dynamic analysis on a malicious file.
The course also includes a bonus module on Fileless Attacks & Targeted Ransomware Attacks1. The curriculum is hands-on and includes real-world scenarios, making it an excellent starting point for careers in incident response and malware analysis.

ادامه مطلب

The course “Attacking and Defending Azure & M365” is a comprehensive training program offered by Xintra. It provides an in-depth understanding of attack techniques, detection, forensics, and mitigation strategies on Azure and Microsoft 365. The course is designed to be hands-on and includes practical labs for real-world learning. It is suitable for individuals interested in cybersecurity, particularly in the context of Azure and Microsoft 365 environments. The course is self-paced, allowing learners to progress at their own speed, and also includes live sessions for interactive learning.

Syllabus

1. Introduction
2. Overview of Azure/M365
3. Setting Up Your Environment
4. Log Analysis Using SOF-ELK
5. Reconnaissance & Enumeration
6. Initial Access Techniques
7. Credential Theft
8. Lateral Movement Techniques
9. Privilege Escalation
10. Persistence Techniques
11. Defense Evasion

Attacking and Defending Azure & M365

ادامه مطلب