Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
15 views10 pages

Cyber Security Course Topics

Uploaded by

arinade000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views10 pages

Cyber Security Course Topics

Uploaded by

arinade000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

INDIA'S LEADING CYBER SECURITY COMPANY

VAPT

BUG HUNTING

RED TEAM ASSESSMENT

HACKING WITH CHAT GPT

MOBILE APPLICATION PENTESTING

www.eyeqdotnet.com
CYBER SECURITY SERVICES
• VA-PT
• RED TEAM ASSESSMENT
• NETWORK PENTEST
Welcome to • SOURCE CODE REVIEW
EYEQ DOT NET PVT. LTD • API PEN TESTING
Safeguarding Your
Digital World from
• WEB APPLICATION PEN TESTING
CYBER CRIMES & HACKERS • MOBILE APPLICATION PEN TESTING
(ANDROID & IOS)
EyeQ Dot Net Pvt Ltd is a leading
cyber security company dedicated to
• THICK CLIENT PEN TESTING
protec ng individuals and organiza ons • GRAY BOX TESTING
from the ever- evolving threats of the • CORPORATE TRAINING
digital world. With our exper se and • CYBER CRIME AWARENESS
advanced technologies, we have gained • CYBER SECURITY WORKSHOPS
a reputa on for being a trusted ally n
the fight against cyber crimes and hackers.
At EyeQ Dot Net Pvt Ltd,
we understand the cri cal importance
of safeguarding your digital
assets and personal informa on.
Our team of skilled professionals DIGITAL FORENSICS SERVICES
combines extensive knowledge,
industry best prac ces, • CYBER CRIME INVESTIGATION
and cu ng-edge solu ons • SOCIAL MEDIA ACCOUNT RECOVERY
(INSTAGRAM, FACEBOOK, YOUTUBE,
to deliver comprehensive GOOGLE ACCOUNT/GMAIL, TWITTER, LINKEDIN)
security measures tailored • MOBILE PHONE FORENSICS
to your specific needs • COMPUTER FORENSICS
• IT FORENSICS
• MALWARE ANALYSIS
• LOST DATA RECOVERY

INDIA'S LEADING CYBER SECURITY


COMPANY
ADVANCE WEB APLICATION
PENETRATION TESTING

• Introduc on to Red Team | VAPT | Bug Bounty and Burpsuite


• Introduc on To Cybersecurity
• Tes ng Standerd
• Hackers & Pentests
• Advance Recon
• Github Recon
• Advanced Google Dorking

VULNERABILITIES
• Brute-forcing • Cross Site Request Forgery
• Mail server misconfigura on vulnerabili es • No Rate Limi ng (Escala ons > Account Lockout ,
(SPF, DMARC) Due to no rate limit, Sms bombing)
• Cms Hun ng • Host Header Injec on & Password Reset Poisoning
• Cri cal File Vulnerability • Scanners
• Installa on of Nuclie Templates
• Session Fixa on / Session Hijacking
• Sniffing / HTTP and HTTPS Vulnerability
• Broken link Hijacking
• Two Factor Authen ca on Bypass / OTP Bypass
• Weak password conforma on
• Weak Reset Password Implementa ons
• Open Redirect Vulnerability
• Click jacking
• Failure to Invalidate Session (main 2 scenarios)

HACKING USING CHAT GPT


• Censys Dorking Using CensysGPT
• Github Dorking Using Chat GPT
• Create and Edit Nuclie Template Using Chat GPT
• Crea ng subdomain enumera on tool using chatgpt

MOBILE APPLICATION PENTESTING

• What is android and APK • What is Frida


• Components of Android • Dynamic Tes ng
• Sta c Applica on Penetra on Tes ng • Root Detec on Bypass
• Manifest Analysis • SSI pinning Bypass
• Sensi ve Data Exposure
• Component Exploita on
• Apk Tool
• jadx GUI
• Automa on for Sta c Tes ng
• Android Debug Bridge

www.eyeqdotnet.com
ADVANCE BUGS

• Target Approach and Report wri ng


• HTML injec on
• XSS injec on – Reflected, Stored, DOM and Blind based
• SQL injec on All Methods
• CORS Misconfigura on
• AP-DOS
• Server Side Request Forgory (SSRF) All methods
• Unrestricted File upload
• Privilege Escala on
• Path Traversal/Dir Lis ng
• Web Cache Poisoning
• Web Cache Decep on
• Race Condi on
• Jira Hun ng
• Business Logic Bugs
• Captcha Bypass
• Direct URL file Access
• S3 bucket enumera on and exploita on
• JWT implementa on vulnerabili es
• SSH Enumera on and Brute forcing
• Buffer Overflow
• Insecure Direct Object Reference (IDOR)
• Cookie without missing or secure HTTPOnly Flag set
• Subdomain Takeover
• Oauth Misconfigura on (Two major scenarios)
• Sensi ve/Informa on disclosure Vulnerabili es
• HTTP Request Smuggling
• BIG-IP RCE
• Laravel Debug RCE
• RCE'S
• GraphQL Injec on
• OS command Injec on
• Admin panel brute forcing and bypass
• File Inclusion Vulnerabili es – LFI/RFI
• Fuzzing
• Finding API and Server Key
• Server side Tamplet Injec on (SSTI)
• XXE
• BONUS SECTIONS ( Surprise BUGS)

www.eyeqdotnet.com
BENEFITS OF OUR TRAINING PROGRAM

• 75+ Vulnerabili es covered on Web app pen test


• Experience Le er will be provided
• Training Comple on Cer ficate
• Internship Comple on Le er
• Training along with Internship
• Interview cracking techniques and skill development
• Welcome EyeQ Kit (T-Shirt, Bo le, Diary Book, Hacker S ckers)
• Job oriented Training program
• 100% Placement assistance
• Live Pen tes ng Sessions
• Task-based internship
• Materials and recordings provided
• Earn recogni on & awards
• Work on client projects
• Dedicated professional mentor
• Real- me projects
• Online & offline training op ons
• Interact with guest hackers
• Global recogni on
• Get chance to work with our Digital forensic team.

www.eyeqdotnet.com
WHY CYBER SECURITY IS NEEDED?

Cybersecurity is important because it protects


all categories of data from the and damage.
This includessensi ve data,personally iden fiable
informa on (PII), protected health informa on (PHI),
personal informa on, intellectualproperty, data,
and governmental and industryinforma on systems.
Withouta cybersecurity program, your organiza on
cannot defend itself against data breach campaigns,
which makes it an irresis ble
target for cybercriminals

Digital Transformation
Cybersecurity is important because it protects
all categories of data from the and damage.
This includes sensi ve data, personally iden fiable
informa on (PII), protected health informa on (PHI),
personal informa on, intellectual property, data, and
governmental and industry informa on systems. Without
a cybersecurity program, your organiza on cannot
defend itself against data breach campaigns, which makes
it an irresis ble target for cybercriminals

Rising Cybercrime
India has witnessed a significant rise in cybercrime
incidents in recent years. Cybercriminals target individuals,
businesses, and government organiza ons to steal
personal informa on, financial data, or disrupt opera ons.
Cybersecurity measures are essen al to safeguard
against hacking, data breaches, ransomware
a acks, and iden ty the .

Data Protection and Privacy

India has introduced the Personal Data Protec on Bill,


emphasizing the importance of safeguarding personal
informa on. Organiza ons need to comply with
data protec on regula ons and ensure the
privacy of user data. Effec ve cybersecurity
prac ces help mi gate the risk of unauthorized
access, data breaches, and viola ons
of privacy rights

www.eyeqdotnet.com
Cyber Security
CAREERS LIST JOBS
• Cybersecurity Trainer/Educator
• Applica on Security Engineer
• Chief Informa on Security Officer (CISO)
• Malware Analyst
• Penetra on Tester
• Network Security Engineer
• Cybersecurity Consultant
• Cloud Security Specialist
• Incident Response Specialist

WEB APPLICATION
Pen-Testing
Packages

INTERMEDIATE PENTEST
01 PREMIUM PENTEST
OWASP Top 10 and Business
Logical Flaws were the primary focus 04 Mainly concentrated on the
OWASP Top 10

VULNERABILITY-BASED TESTING
BASIC PENTEST
02 05
Pen testing based on vulnerabilities, EyeQ dot Net also provides
focused on medium level vulnerabilities like broken this option. You can choose this option if you do not want to use our
link hijacking,Information disclosure bugs, session packages and believe that your web app is secure and that full pen
testing is not required. In this, we only take payment if we find
management issues, open redirects, vulnerabilities, and you can pay accordingto the priority of the
clickjacking, X55, CSRF, etc bugs we identify.

FLAGSHIP PENTEST
03 All types of vulnerability tests will be conducted (65+ vulns),
Including business logical flaws. (P1, P2, P3, P4, P5)All types
of vulnerability tests will be conducted (65+ vulns), Including
business logical flaws. (P1, P2, P3, P4, P5)

www.eyeqdotnet.com
Why would your

Vulnerabili es exist in all levels of a compu ng system


on-premise and cloud) regardless of the organiza on's size.
There's a big misconcep on that small and medium-sized businesses
are spared by cyber a ackers. But this is far from reality.
As the security of small businesses is usually relaxed, a ackers
incline towards them. Many mes, organiza ons say they
don't require vulnerability risk assessments because they're
such a small organiza on. But this false belief could prove
very costly for a business, big or small - SME or MNC
The security loopholes in your IT infrastructure are:

HOW VA-PT WORKS?


Flaws, penetra on test exploits the vulnerabili es
in the system & determines the security gaps.

www.eyeqdotnet.com
We are proud to
showcaseour notable
events and
accomplishments
in the eld of cybersecurity.

www.eyeqdotnet.com
INDIA'S LEADING CYBER SECURITY COMPANY

Contact US
+91 91480 81018 | +9190351 48447

E-mail: [email protected]
Web: www.eyeqdotnet.com
eyeq_dot_net EyeqDotnet EyeQ Dot Net EYEQDOTNET

You might also like