Cyber Security Trainings

Hackers are ready, are You?

Our Cyber Security training courses provide you with the skills you need to maintain the IT security and integrity of your organizations' networks. Learn cyber security from an introductory level to in-depth issues

Offensive Security Workshop 

This workshop is intended for Security Professionals who are already familiar basics IT security and want to learn how to perform penetration testing in their environments. Students will be trained in workshop to understand how current penetration testing tools work and how to use them. This workshop will prepare students to take and pass vendor specific exams such as EC Council Certified Ethical Hacker.

Day 1 - Planning, Scoping and Recon

This day teach you on how to develop your skills which are needed to perform penetration testing. How to build your own penetration testing infrastructure and which tools to use. 


Day 4 - Password Attacks

On this day we will turn our attention on password attacks and tools which helps us to perform password cracking and pass the hash technique. 

Day 2 - Scanning

On this day we are focusing on mapping potential attack machines by creating comprehensive inventory of machines. We will learn about some of the most popular scanning tools.

Day 5 - Wireless and Web App Penetration testing

This topic is focusing on how to perform wireless network attacks and how to perform Web Application penetration testing. 

Day 3 - Exploitation

This topic will teach you many kinds of exploits that penetration testers use to compromise the target. We will learn about different tools and how to exploit with them.

Advanced Penetration Testing Workshop

This workshop is intended for Security Professionals who are already familiar with basics of offensive attacks and want to learn more on current real world cyber attacks and how to perform them. Students will be trained in workshop to understand advanced attacks and perform them on comprehensive lab environment. 

Day 1 - Reconnaissance and Scanning

1. Penetration testing foundations

1.1 Ethical Hacking Platform

1.2 Reconnaissance Foundation

1.2.1 Web Reconnaissance 

1.2.2 Google Hacking

1.2.3. Whois and DNS

1.2.4. Maltego

2.1 Scanning Foundations

2.1.1 Network Sweeping - Angry IP and ICMPQuery

2.2 Hping3 Configuration and Usage

2.3. nmap Configuration and Usage

2.3.1 nmap Vulnerability Scanning

2.3.2 nmap NSE 

2.4. Scanning with Rapid7 NexPose

2.5. Enumarating Users

2.6. Netcat usage

Day 2 - Exploiting

1. Types of Exploits

1.1 Metasploit Foundations

1.2 Metasploit Advanced

1.3 Password Cracking

1.4 Pass the Hash

Day 3 - OS Exploiting

1. Linux exploiting system and services

2. Windows exploiting system and services

                             .,`                   
                          ,.`.:;;.                 
                        .`,    `;;`                
                        ,       :;:                
                      ,         `;;                
                     ;           ;;                
                    :            ;:                
                   .`           .;:                
 +`   ++ +++++++ :++++++ '++++++:;:,:::::::::::::  
+++,  ++ ++++++ ,++++++. '+++++:;:;;:;;;;;::;;:;;;`
++++; ++ ++,,,,.:+,````  '+,,,,,;:;:      ;:     ;:
++ ++'++ ++++++  '++++++`'++++,;::;`      ;:     ;;
++  ++++ ++           .+:'+  `:;: ;;.     :;.   :;:
++   ;++ ++++++` +++++++ '+++,;:   :;;;;:  :;;;;;: 
                 :          .;:.                   
                 ;,        .;:,                    
                 ,;       :;:.                     
                 ,,;;:;..;::                       
                  :,`.:;::,                        
                   `;:::`                          

Day 4 - Web and Wireless Penetration testing

1. Wireless attack foundations

1.1 Wireless WEP attacks

1.2 Wireless WPA attacks

1.3 Exploiting Wireless APs

2. Web attack foundations

2.1 Web Proxy - Burp

2.2. Cross Site Scripting

2.3 Sql injection 

2.4 Command injection

Day 5 - Capture the Flag Day

1. Capture the Flag tournament between students which represent the culmination of everything learned in 4 days where students will conduct an actual penetration test in an lab environment