7-DAY BOOTCAMP
1
About
Anfeidrol is an educa�on venture
of BoredProgrammers Pvt. Ltd.
It is a leading learn-tech startup
pla�orm that provides live and
Anfeidrol interac�ve instructor-led online
training.
We also cater na�onwide to professionals and
students who seek offline hands-on knowledge
through our workshops and summer/winter
training.
7-Day Bootcamp, consis�ng of
21 hours of project-oriented
training on your favourite module.
2 About
Bootcamp comes with life-�me Bootcamp
access to the videos and materials
used during the course.
We have expert trainers for each module in every
par�cular Bootcamp, which means you’ll be
ge�ng training from mul�ple trainers who are
skilled and trained in their niche.
3 Bootcamp cer�ficate will be in
associa�on with our Educa�on
and Cer�ficate Partners,
Certificate Adobe, BoredProgrammers,
Partners EC-Council, HPE and Microso�.
Bootcamp cer�ficate will be
cer�fied from top colleges and
ins�tu�ons including, IIT Ropar,
IIIT Lucknow, and Assam
4
College
Engg. College. It’s in associa�on Partners
with their respec�ve tech-fests.
5 All par�cipants would be awarded
with a verifiable cer�ficate of
merit, based on the
Perks & bootcamp-end exam. You’re also
Goodies eligible for tech and SWAG
goodies.
Further, perks of enrolling includes, Internship
opportuni�es with BoredProgrammers and
partner companies. Each par�cipant would be
provided with 100% Interview and Job Assistance. START
Best of Luck for Your Bootcamp
Start with a Good Vibe
DO NOT COPY
1
DAY 1.1
1st Milestone begin
Introduction to EH & CS
Indian Cyber Law
Introduction to Pentesting | Bug hunting | CTF DAY 1.2
Practical Implementation of Data -Hiding
Pathway of our Learnings
PDF & Ebooks for our bootcamp
DAY 1.3
Enumeration Techniques & Scannings
Covering tracks in Steganography | Implementation
2nd Milestone begin
3
anfeidrol.com
4
DAY 2.1
Introduction to Networking
CCNA | Routing
CCNA | Switching
Practical Implementation of R & S
DAY 2.2
Logic Behind Google Server | Implementation
Testing IP & Domain for website | Router
VPN | R & S
Security on Networks | Firewall | IDS
5
6
DAY 2.3
Logic Behind Wi-Fi | Detailed Version
Practical Implementation of Wi-Fi on Cisco PT
Introduction to OS
7
8 DAY 3.1
DAY 3.2 Concept of Virtualization
Setting Up our Hacking Machine
3rd Milestone begin
Introduction to Attacks Setting Up our Hacking Tools Required
Types of attacks with Demo
Practical Implementation of Cybar Attacks
Security | Implementation
Anfeidrol.com | Boredprogrammers.com [email protected]
DO NOT COPY
DAY 3.3
Capturing Keys | Keyloggers
Practical Implementation of Keylogger | Creation
Introduction to cloning | Website cloning
Phishing | Practical Demonstartion
9
4th Milestone begin
DAY 4.1
Introduction to Login Password Hacking
Demonstration of Win XP | Win 7 Hacking
Logic Behind Password Cracking | Hacking
10
URL Attacks | URL Hiding | Masking
DAY 4.2
Security for both Windows XP | 7
Login Password for Win 10 hacking | all types
Bios Hacking
Windows 10 Security | Bios Security | System Security
11
anfeidrol.com
12
DAY 4.3
Cool Hacking Tricks | list
SMS Flooding | DND Flooding
EMAIL Tracing | Work Implementation
Call flooding | Number Masking
DAY 5.1 5th Milestone begin
Introduction to System Hacking with Internet
Introduction to System Hacking without Internet
Internet Data Hacking | Local Networks | Network Sharing Controls
13
14
DAY 5.2
Introduction to Virus
Practical Implementation of Virus
Advance Virus for Systems | Worms
6th Milestone begin
15
16 DAY 5.3
DAY 6.1 Human Interaction
Without Interaction
Introduction to Smartphones
Security Virus | Worms | Backup Drives
Smartphone Hacking Demonstartion
Anfeidrol.com | Boredprogrammers.com [email protected]
DO NOT COPY
DAY 6.2
Google Hacking |Dorks
WebCam Hacking Through IP | Sub IP
Database searching Techniques
Security to all Types of DB
17
DAY 7.1
Brief of Wi-Fi & Limitations
Wi-Fi Hacking | WPS | WPA | WPA2
Wireless Security
7th Milestone begin
18
DAY 7.2
Introduction to DB | Attacks | Website Hacking
SQL attacks | Data Retrive Process
SQL attack tools
19
anfeidrol.com
20
DAY 7.3
Introduction to data
Data Deletion | Process | Workflow
Data Recovery | Forensic
ONE method to protect all your systems
END
Learning Never Ends
This is the END of Bootcamp Only
Best of Luck for Your Bootcamp Exam*
Thank You
Anfeidrol.com | Boredprogrammers.com [email protected]