kelas
Kelas Pentest Indonesia
Ethical Hacking
Cyber Kill Chain Methodology
Risk Management
Incident Management
MITRE ATT&CK Framework
Reconnaissance
NetScan
Standar Procedures for Network Scanning
Relevant Laws and Regulations
Introduction to Network Scanning
Practical Exercises
Enumeration and Countermeasures
Understanding Vulnerability Analysis in Cybersecurity
Best Practices for Vulnerability Analysis
Vulnerability Testing Research
Vulnerability Analysis
Introduction to Vulnerabilities
Vulnerability Hunting
Case Studies and Examples
Understanding Web Server Security and Attack Mitigation
Common Web Server Attacks
Website Defacement
Patch Management
Web Server Attack Methodology
Web Server Operation
Understanding Web Application Security and Attack Mitigation
Webhooks and Web Shell
Web Application Hacking Methodology
Web Application Security Risks
Web API
Web API Hacking Methodology
Web Application Security
Web Application Architecture
Web Application Threats
Understanding Session Hijacking Attacks and Countermeasures
Spoofing
Session Hijacking Detection Methods
Session Fixation Attack
Network Level Session Hijacking
Session Hijacking
Session Replay Attacks
Application-Level Session Hijacking
Man-in-the-Browser Attack
Types of Session Hijacking
Understanding SQL Injection Attacks and Mitigation
SQL Injection Methodology
SQL Injection
Blind SQL Injection
Types of SQL Injection
Signature Evasion Techniques
Evading IDS and Firewalls: Techniques and Countermeasures
Introduction to Evasion Techniques
Firewall, IDS Rules, and Patch Management
Bypassing Firewall Rules Using Tunneling
Bypassing Windows IDS
Bypassing Windows Firewall
Bypassing Antivirus
System Hacking Techniques and Countermeasures
Introduction to System Hacking
Offline & Online Password Cracking
Privilege Escalation
Privilege Escalation in Linux Machines
Buffer Overflow
Clearing Windows and Linux Machine Logs
Understanding Malware Threats and Mitigation Strategies
Anti-Trojan and Antivirus Software
Exploit Kits and Exploits
Malware Analysis
Virus Detection Methods
Malware Overview
Trojan
Virus
Ransomware
Understanding Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
DoS/DDoS Attack Detection Techniques
DoS/DDoS Attack Techniques
DoS and DDoS Attacks Overview
Botnets
Introduction to Cryptography and Encryption Techniques
Email Encryption
Encryption Algorithms
Public Key Infrastructure (PKI)
Cryptography Overview
MD5 and MD6 Hash Calculators
Disk Encryption