top of page
8585d8b1-d1d7-4914-9268-c47e9880abdc.png
inject-blog-service_1733729830179.png

OUR COURSES

Our courses are meticulously crafted to ensure that every student receives a thorough understanding of critical concepts and practical applications in the cybersecurity field.

1.Flexible Learning

2.Expert-Led Training Program

3.Hands – on Experience

Cyber Security - Pre-Attack Phase

Module  1. Anatomy of Cyber Security

Module  2. Cyber Security Roles

Module  3. Introduction to Transformation of Data

Module  4. SOC Management Processes

Module  5. Footprinting (Information Gathering)

Module 6. Scanning and Enumerating Networks

Module 7. Analysing Vulnerability

2

Cyber Security - Attack Phase

Module 8. Endpoint Hacking

Module  9. Malware and Virus Attacks

Module 10. Sniffing Networks

Module  11. Social Engineering And Phishing.

Module 12. DoS, DDoS and Ransomware

Module 13. Session Hijacking And MITM Attack

Module 14. Defence Evasion Techniques (Firewall, IDS, Honeypots)

Module 15. Compromising Web Servers

Module 16. Hacking Web Applications

Module 17. Compromising Database using Sql Injection

Module  18. Hacking Mobile Platforms

Module 19. Hacking Wireless Networks

Module 20. Hacking IoT Devices

Module 21. Introduction to Cloud Computing

Module 22. Cryptography Techniques

Module 23. Introduction to Shell GPT and Automation in Cyber Security

3

Forensic Investigations

Module  1.  Introduction to Computer Forensics

Module  2.  Endpoint Investigation Process.

Module  3. Understanding Storage Devices (HDD,  SSD).

Module  4. Introduction to different File Systems.

Module  5. Data Acquisition and Duplication.

Module  6. Anti-forensics Techniques.

Module  7. Windows OS Forensics.

Module  8. Linux OS and Mac OS Forensics.

Module  9. Network Inspections.

Module  10. Investigating Web Server Attacks.

Module  11. Dark Web Investigations.

Module  12. Database Investigations.

Module  13. Cloud Investigations.

Module  14. Email Crime Forensics.

Module  15. Malware and Virus Forensics.

Module  16. Mobile Forensics.

Module  17. IoT Forensics.

4

AWS Cloud

1)To launch Linux EC2 Instance

•1a. To connect to Amazon Linux instance from linux client operating system

•1b. To connect to Amazon Linux instance from windows client operating system.

2)To launch Windows EC2 instance in AWS

•2a. To connect to Amazon Linux instance from linux client operating system

•2b. To connect to Amazon Linux instance from windows client operating system.

3)To configure webserver on Amazon on Linux instance with elastic IP.

4)To assign Elastic IP address.

5)To manage Elastic Block Store (EBS)

6)To manage IAM users, Groups, and Policies.

7)To configure Simple Storage Service (S3).

8)To configure Versioning on S3

9)To configure Static Website Using S3

10)To configure Amazon Glacier.

11)To configure Amazon Virtual  Private Cloud (VPC).

12)To create your own VPC

13)To create public cloud

14)To create private subnet

15)Create a Internet Gateway and attach to your VPC

16)Create Public Routing Table, associate subnet and add routing rules

17)Create Private Routing Table, associate subnet and add routing rules

18)To launch Windows instance in Public Subnet

19)To launch Windows instance in Private Subnet under PRIVATE VPC

20)To connect public subnet instance

21)To connect to private subnet instance

22)To connect to linux instance in private subnet

23)To connect to linux instance in private subnet

24)To configure Amazon Cloudwatch

25)To configure Amazon Simple Notification Service (SNS)

26)To configure Amazon Elastic Load Balancer

27)To configure Auto Scaling With Load Balancer

28)To configure an Elastic Beanstalk with Tomcat Application

29)To configure an Amazon Relational Database Service

30)To configure Amazon DynamoDB

31)To configure Amazon CloudFormation

32)To configure Amazon Simple E-Mail Service (SES)

33)To configure Amazon Simple QUEUE Service (SQS)

34)To configure Amazon Route53

35)To configure Amazon EFS Service

36)To configure Amazon CloudFront Service

37)Creating AMI

38)CloudTrail

Address

SF-202, Vini Apartment, N.S Phadke chowk, Sadashiv Peth, Pune, Maharashtra- 411030

Phone

+91 9998047993

​

+91 9998046993

Email

Connect

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram

Reach out to us for any inquiries or assistance. We are here to support your journey in mastering cyber security.

Connect With Us On:

  • LinkedIn
  • Facebook
  • Instagram

+91 9998047993

+91 9998046993

© 2023 Hackers Hub. All rights reserved.

bottom of page