kelas

Kelas Pentest Indonesia

Introduction to Ethical Hacking and Iinformation Security

Ethical Hacking

Elements of Information Security

Cyber Kill Chain Methodology

Risk Management

Incident Management

Information Assurance

MITRE ATT&CK Framework

Understanding Footprinting and Reconnaisance in Cybersecurity

Reconnaissance

Hybrid Footprinting

Footprinting

Active Footprinting

Passive Footprinting

Network Scanning and Enumeration in Information Security

NetScan

Standar Procedures for Network Scanning

Performing Scanning Beyond IDS and Firewall

Information Security Controls

Relevant Laws and Regulations

Introduction to Network Scanning

Practical Exercises

Enumeration and Countermeasures

Understanding Vulnerability Analysis in Cybersecurity

Best Practices for Vulnerability Analysis

Vulnerability Assessment Tools

Vulnerability Testing Research

Vulnerability Analysis

Introduction to Vulnerabilities

Vulnerability Hunting

Case Studies and Examples

Understanding Web Server Security and Attack Mitigation

Common Web Server Attacks

Web Server Security Tools

Website Defacement

Web Server Attack Tools

Patch Management

Patch Management Tools

Web Server Attack Methodology

Web Server Operation

Understanding Web Application Security and Attack Mitigation

Webhooks and Web Shell

Web Application Hacking Methodology

Web Application Security Risks

Web API

Web API Hacking Methodology

Web Application Security

Web Application Architecture

Web Application Threats

Understanding Session Hijacking Attacks and Countermeasures

Spoofing

Session Hijacking Tools

Session Hijacking Detection Methods

Session Hijacking Prevention Tools

Session Fixation Attack

Network Level Session Hijacking

Session Hijacking

Session Replay Attacks

Application-Level Session Hijacking

Man-in-the-Browser Attack

Types of Session Hijacking

Understanding SQL Injection Attacks and Mitigation

SQL Injection Methodology

SQL Injection

Blind SQL Injection

SQL Injection Detection Tools

SQL Injection Tools

Types of SQL Injection

Signature Evasion Techniques

Evading IDS and Firewalls: Techniques and Countermeasures

Introduction to Evasion Techniques

Firewall, IDS Rules, and Patch Management

Bypassing Firewall Rules Using Tunneling

Bypassing Windows IDS

Bypassing Windows Firewall

Bypassing Antivirus

System Hacking Techniques and Countermeasures

Introduction to System Hacking

Offline & Online Password Cracking

Privilege Escalation

Privilege Escalation in Linux Machines

Buffer Overflow

Clearing Windows and Linux Machine Logs

Understanding Malware Threats and Mitigation Strategies

Anti-Trojan and Antivirus Software

Exploit Kits and Exploits

Malware Analysis

Virus Detection Methods

Malware Overview

Trojan

Virus

Malware Detection Tools

Ransomware

Understanding Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks

DoS/DDoS Protection Tools

DoS/DDoS Attack Detection Techniques

DoS/DDoS Attack Techniques

DoS and DDoS Attacks Overview

Botnets

DoS/DDoS Attack Tools

Introduction to Cryptography and Encryption Techniques

Email Encryption

Encryption Algorithms

Public Key Infrastructure (PKI)

Cryptography Tools

Cryptography Overview

MD5 and MD6 Hash Calculators

Disk Encryption