Cyber Security Classroom

  Cyber Security Classroom Training

    Cyber Security+Cyber attacks

We provide 100% Practical training on Cyber Security.We have both online and offline training facility available.Depending on your Intrest you can choose your training mode and training programmes.

Linux Basics Required For penetration Testing
Windows Basics Required for Penetration Testing
Networking Basics: Like IP,subnet mask,class,Router,switch,Nat,Bridge etc
Penetration Testing Complete Lab setup using Virtualization/VMware/VirtualBox
User and Group management in Linux Server
File and Folder management
Permission management
Package management
Web server Configuration in Linux
yum server configuration in Linux
chat server in linux
telnet server in Linux
ftp and ssh server in Linux
proxy server configuration in Linux
python as web server in Linux
secure telnet server in linux
Web Proxy Lab in Linux
Web Authentication Lab Linux
Everything as HTTP in Windows7/8/10
HTTP server lab for penetration testing with Authentication
FTP server lab setup with Authentication
HTTP port based security
FTP port based security
Telnet and SSH Server setup with Password protection
Telnet Proxy lab
Proxychain Configuration Lab
SSH Control
Disable SSH root user login
Limit Users’ ssh access
AllowUsers in ssh
DenyUsers in ssh
Disable Empty Passwords
Use TCP wrappers for ssh
Enable a warning banner for ssh users
SSH Server Best Security Practices : Learn to secure OpenSSH with example Lab | Cyber Security Lab
Web Server Lab Setup for Penetration Testing
Payload creation and exploiting android device.
Netcat tools usage
banner Grabbing
Understanding Encoding
Brute Force Website Login Page
Hack the Basic HTTP Authentication using Burpsuite or Hydra
Ways to Directory Bruteforcing on Web Server
Understanding Redirection with Hashing and Crypto Salt
Understanding Redirection with Encoding Techniques
ways to Brute Force Attack on WordPress Website
Penetration Testing in WordPress Website using Wpscan
Port Scanning using Nmap
IP and Network Scanning
DNS Footprinting
DNS Enumeration
Network setup in Linux

Linux File systems

Fake File Creation

Disk dumping Disk zeroing and Null Disk

Partition Management

Package Management

Remote Login Program

IP Based security

Network based security

Time Based security

Load based Security

Connection Based Security

Port based security

Malware Detection in Linux

Audit Linux server or Linux Machine

Firewall configuration and Firewall security

information gathering Techniques

Social engineering – Scams, cons, tricks and fraud

social engineering and Web Assessment
Hacking Facebook using Social Engineering
Hacking Gmail using Social Engineering
information gathering using Dmitry tool
information gathering using netdiscover
information gathering using Sparta
Password Attacking through Hydra
Password Attacking through Medusa
Password Attacking through John
Create own dictionary using Crunch
Malware Detection and prevention
complete System Audit and Report generation
Antivirus Setup and Scanning on Linux Servers
Rootkits Scanning and Testing

gpg encryption with gpgsplit complete Lab

Creating a Workspace …………………………………………………………………
Database Nmap Scan …………………………………………………………………..
Hosts Database……………………………………………………………………………
Services Database ……………………………………………………………………….
Vulnerabilities Database …………………………………………………………….
Credentials Database …………………………………………………………………
Renaming Workspace ………………………………………………………………..
Deleting a Workspace ……………………………………………………………….
Verbose Details of Workspaces ………………………………………………….
Exporting Workspace ………………………………………………………………..
Deleting all Workspaces………………………………………………….
Importing Hosts………………………………………………………………
Listing Hosts in Database ……………………………………………………
Adding Hosts ………………………………………………………………
Deleting a host ……………………………………………………………….
Exporting Hosts Database …………………………………………………………..
Search and Tag Hosts ……………………………………………………………..
Filter Search……………………………………………………………………
Deleting Services of a Host…………………………………………………………
Filter Search…………………………………………………………………..
Port Specific Services……………………………………………………………
Exporting Services Database ………………………………………………………
Search Services………………………………………………………………….

Port Specific Vulnerabilities……………………………………………………
Service Specific Vulnerabilities ………………………………………………..
Host Specific Vulnerabilities………………………………………………….
Exporting Vulnerabilities Database………………………………………………
Loot Database ………………………………………………………………………….
Search Loot……………………………………………………………………….
Type Specific Loot……………………………………………………………………..
Deleting Loot……………………………………………………………………………


Metasploit Framework for scanning services
Metasploit Framework for Exploiting services
Metasploit Framework for exploring open port and other information
DOS Attack’s Testing Lab/Live Demonstration
Webcam Hacking Lab
Firewall configuration, setup and usage with example labs.
Firewall Testing
Testing Web Application Firewall
Load Balancing Detector
Information gathering, Network scanning, port scanning, Service Scanning using Metasploit Framework and other tools.
ping attack/FPS in gaming
Physical Theft
Abuse of Privileges
Unauthorized Access by Outsider
Malware infection
Intrusion detection and Prevention Techniques
Anti-Malware software
Network based Intrusion detection Systems
Network based Intrusion Prevention Systems
Host based Intrusion prevention Systems
Security Information Management
Network Session Analysis
System Integrity Validation.

Mariyam Kali Linux Tool
what is OWASP maryam
OSINT Modules
maryam framework startup
create workspace
set framework options
dnsbrute tool
crwal_pages tutorials
search modules
searx
quora
Username_serach
document_search
tweet search
document search

Linux File systems

Fake File Creation

Disk dumping Disk zeroing and Null Disk

Partition Management

Package Management

Remote Login Program

IP Based security

Network based security

Time Based security

Load based Security

Connection Based Security

Port based security

Malware Detection in Linux

Audit Linux server or Linux Machine

Firewall configuration and Firewall security

information gathering Techniques

Social engineering – Scams, cons, tricks and fraud

social engineering and Web Assessment
Hacking Facebook using Social Engineering
Hacking Gmail using Social Engineering
information gathering using Dmitry tool
information gathering using netdiscover
information gathering using Sparta
Password Attacking through Hydra
Password Attacking through Medusa
Password Attacking through John
Create own dictionary using Crunch
Malware Detection and prevention
complete System Audit and Report generation
Antivirus Setup and Scanning on Linux Servers
Rootkits Scanning and Testing


gpg encryption with gpgsplit complete Lab

DOS Attack’s Testing Lab/Live Demonstration
Webcam Hacking Lab
Firewall configuration, setup and usage with example labs.

Iptables configuration

Iptables services

ACL syntax for iptables

Iptables basic commands

Appending/Inserting rules

Replace rules for firewall

Firewall Backup and Restoring rules using Iptables

flush all chains PREROUTING FORWARD INPUT OUTPUT POSTROUTING

zero counters in Firewall

erase user created chains

allow icmp or ping protocol

open ssh port using Firewall

VNC client port using Frewall

Webserver:create rules to allow all traffic on port 80 and 443.

multiport allow or deny using Firewall

MAC address level filtering

Iptables log

allow Samba in iptables

configure NFS services to use fixed ports.

configure firewall to allow nfs traffic


Firewall Testing
Testing Web Application Firewall
Load Balancing Detector
Information gathering, Network scanning, port scanning, Service Scanning using Metasploit Framework and other tools.
ping attack/FPS in gaming
Physical Theft
Abuse of Privileges
Unauthorized Access by Outsider
Malware infection
Intrusion detection and Prevention Techniques
Anti-Malware software
Network based Intrusion detection Systems
Network based Intrusion Prevention Systems
Host based Intrusion prevention Systems
Security Information Management
Network Session Analysis
System Integrity Validation.



0 coment�rios:

Post a Comment

100 Web Vulnerabilities you should know as a Web application Penetration Tester

100 Web Vulnerabilities you should know as a Web application Penetration Tester If you are working as web application penetration testing en...