Cybersecurity Training

Cybersecurity Training

Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cybersecurity. According to a December 2010 analysis of U.S. spending plans, the federal government has allotted over $13 billion annually to cybersecurity over the next five years.

Read More

Ensuring cybersecurity requires coordinated efforts throughout an information system. Elements of cybersecurity include: One of the most problematic elements of cybersecurity is the quickly and constantly evolving nature of security risks. The traditional approach has been to focus most resources on the most crucial system components and protect against the biggest known threats, which necessitated leaving some less important system components undefended and some less dangerous risks not protected against. Such an approach is insufficient in the current environment. Adam Vincent, CTO-public sector at Layer 7 Technologies (a security services provider to federal agencies including Defense Department organizations), describes the problem: "The threat is advancing quicker than we can keep up with it. The threat changes faster than our idea of the risk. It's no longer possible to write a large white paper about the risk to a particular system. You would be rewriting the white paper constantly..." To deal with the current environment, advisory organizations are promoting a more proactive and adaptive approach. The National Institute of Standards and Technology (NIST), for example, recently issued updated guidelines in its risk assessment framework that recommended a shift toward continuous monitoring and real-time assessments.

Foundational Courses

  1. EC Council Secure Computer User Specialist
  2. CyberSAFE (Securing Assets For End-Users)
  3. CyberSec First Responder: Threat Detection and Response

Advance Courses

  1. CompTIA Security
  2. Certified Ethical Hacker v9
  3. Certified Information Security Systems Professional (CISSP)
  4. EC Council Security Analyst (ECSA) v9 Training
  5. EC-Council Certified Secure Programmer .NET (ECSP

EC Council Secure Computer User Specialist

About This Course

The purpose of the SCUS training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering.  More importantly, the skills learnt from the class helps students take the necessary steps to mitigate their security exposure.

Who Should Attend

  • This course is specifically designed for todays’ computer user who uses the internet and the www extensively to work, study and play.
  • This certification is an excellent complement to educational offerings in the domain of security and networking.
  • Educational institutions can provide greater value to students by providing them not only with one of the most updated courseware available today but with a certification that empower their students in the corporate world. The courseware comes complete with labs and exercises to allow the student to gain actual skills.
Enquire For Price & Details


Foundational Courses

1. Secure Computer User Specialist (SCUS) Course Outline

SCUS Module 01: Foundations of Security

  • Security Incident Occurrences Over Time
  • Security Incidents by Breach Type – 2011
  • Essential Terminologies
  • Computer Security
  • Why Security?
  • Potential Losses Due to Security Attacks
  • Elements of Security
  • The Security, Functionality, and Ease of Use Triangle
  • Fundamental Concepts of Security
  • Layers of Security
  • Security Risks to Home Users
  • What to Secure?
  • What Makes a Home Computer Vulnerable?
  • What Makes a System Secure?
  • Benefits of Computer Security Awareness
  • Basic Computer Security Checklist

SCUS Module 02: Securing Operating Systems

  • System Security
  • Threats to System Security
    • Password Cracking
  • How Does Malware Propagate?
  • Guidelines for Windows OS Security
    • Lock the System When Not in Use
    • Create a Strong User Password
    • Change Windows User Password: Windows 7
    • Disable the Guest Account: Windows 7
    • Lock Out Unwanted Guests in Windows 7
    • Rename the Administrator Account in Windows 7
    • Disable Start up Menu in Windows 7
    • Windows Updates in Windows 7
    • Pointers for Updates
    • Apply Software Security Patches
    • Configuring Windows Firewall in Windows 7
    • Adding New Programs in Windows Firewall in Windows 7
    • Removing/Disabling Programs Rules from the Windows Firewall in Windows 7
    • Creating a New Windows Firewall Rule in Windows 7
    • Two-Way Firewall Protection in Windows
    • Always Use NTFS
  • Windows Encrypting File System (EFS)
    • How to Decrypt a File Using EFS in Windows?
    • Using Windows Defender
    • Enable BitLocker in Windows 7
    • Launching Event Viewer in Windows 7
    • Event Viewer: Events and How to Read Logs on the System
    • Disabling Unnecessary Services in Windows 7
    • Killing Unwanted Processes
    • Finding Open Ports Using Netstat Tool
    • Configuring Audit Policy
    • How to Hide Files and Folders?
    • Disable Simple File Sharing in Windows
    • Raise the UAC Slider Bar in Windows 7
  • Windows Security Tools
    • Windows Security Tools: Microsoft Security Essentials
    • Windows Security Tools: KeePass Password Safe Portable
    • Windows Security Tools: Registry Mechanic
    • Windows Security Tools: Windows Defender
  • Guidelines for Securing Mac OS X
    • Step 1: Enabling and Locking Down the Login Window
    • Step 2: Configuring Accounts Preferences
    • Step 3: Guidelines for Creating Accounts
    • Step 4: Securing the Guest Account
    • Step 5: Controlling Local Accounts with Parental Controls
    • Step 6: Use Keychain Settings
    • Step 7: Use Apple Software Update
    • Step 8: Securing Date & Time Preferences
    • Step 9: Securing Network Preferences
    • Step 10: Enable Screen Saver Password
    • Step 11: Set Up FileVault to Keep Home Folder Secure
    • Step 12: Firewall Security
  • Resources on the Internet for Computer Security
  • Operating Systems Security Checklist
  • Windows 7 Security Checklist
  • MAC OS Security Checklist

SCUS Module 03: Protecting Systems Using Antiviruses

  • Introduction to Antivirus Software
    • The Most Dangerous Computer Viruses of All Time
    • Introduction to Antivirus Software
    • Need for Antivirus Program
  • How Does Antivirus Software Work?
    • Antivirus Software 2011
  • Choosing the Best Antivirus Software
  • Steps to Install Antivirus
    • Steps to Install Antivirus on Your Computer
    • How to Test if Antivirus is Working?
  • Configuring McAfee Antivirus
  • Configuring Kaspersky PURE
    • Configuring Kaspersky PURE: Backup and Restore
    • Configuring Kaspersky PURE: Computer Protection
    • Configuring Kaspersky PURE: Parental Control
    • Kaspersky PURE: Administrative Tools
  • Antivirus Security Checklist

SCUS Module 04: Data Encryption

  • Encryption
    • Common Terminologies
    • What Is Encryption?
    • Objectives of Encryption
    • Usage of Encryption
  • Types of Encryption
    • Symmetric vs. Asymmetric Encryption
  • Encryption Standards
  • Digital Certificates
    • How Digital Certificates Work
  • Digital Signature
  • How Digital Signature Works
  • Cryptography Tools
  • TrueCrypt
  • Cryptography Tools

SCUS Module 05: Data Backup and Disaster Recovery

  • Data Backup Introduction
    • Data Backup
    • Types of Data Loss
    • What Files to Backup and How Often?
    • Online Data Backup
    • Online Backup Service Providers
    • Types of Backup
  • Windows 7 Backup and Restore
    • Back Up the Data Using Windows Backup
    • Steps to Backup Data
    • Restoring Data
  • Data Encryption
    • Securing Backup on Storage Devices with Encryption
    • Data Encryption Tool: TrueCrypt
  • MAC OS X Backup and Restore
    • Time Machine (Apple Software)
    • Setting Up Time Machine
    • Restoring Files from Time Machine Backups
  • Data Backup Tools
    • Windows Data Backup Tool: Acronis True Image Home 2011
    • Windows Data Backup Tool: NovaBACKUP Home Protection
    • Data Backup Tools for Windows
    • MAC OS X Data Backup Tool: Data Backup
    • MAC OS X Data Backup Tool: SmartBackup
    • Data Backup Tools for MAC OS X
  • Data Recovery Tools
    • Windows Data Recovery Tool: Recover My Files
    • Windows Data Recovery Tool: EASEUS Data Recovery Wizard
    • Data Recovery Tools for Windows
    • MAC OS X Data Recovery Tool: Boomerang Data Recovery Software
    • MAC OS X Data Recovery Tool: VirtualLab
    • Data Recovery Tools for MAC OS X
  • Physical Security
    • Physical Security Measures: Locks
    • Physical Security Measures: Biometrics
    • Physical Security Measures: Fire Prevention
    • Physical Security Measures: HVAC Considerations
    • Securing Laptops from Theft
    • Laptop Theft Countermeasures
  • Data Backup Checklist
  • Physical Security Checklist

SCUS Module 06: Internet Security

  • Browser Security
    • Internet Security
    • Internet Explorer Security Settings
      • Internet Explorer Security Settings: Internet Zone
      • Internet Explorer Security Settings: ActiveX Controls
      • Internet Explorer Security Settings: Local Intranet Zone
      • Internet Explorer Security Settings: Trusted Sites Zone
      • Internet Explorer Security Settings: Restricted Zone
      • Understanding Cookies
      • Internet Explorer Privacy Settings
      • Deleting Browsing History
      • Do Not Allow the Browser to Remember any Password
      • Securing File Downloads
    • Mozilla Firefox: Security Settings
      • Mozilla Firefox: Privacy Settings
      • Securing File Downloads
      • Installing Plugins
    • Google Chrome Privacy and Security Settings
      • Google Chrome: Privacy Settings
      • Google Chrome: Security Settings
    • Apple Safari: Security Settings
    • Testing the Browser for Privacy
  • Search Engine and IM Security
    • Instant Messaging (IMing)
    • Instant Messaging Security Issues
    • Instant Messaging Security Measures
    • Searching on the Web
  • Online Games
    • Online Gaming and MMORPG
    • Online Gaming Risks
    • Insecure or Compromised Game Servers and Game Coding
    • Social Risks
    • Social Engineering
      • Message from a Gamer About a Password Stolen by a Malicious Program
      • Protection Schemes, Cyber Prostitution, and Virtual Mugging
    • How the Malicious Users Make Money
    • Security Practices Specific to Gaming
      • Recognize Administrator Mode Risks
      • Recognize Risks due to ActiveX and JavaScript
      • Play the Game, Only at the Game Site
      • Pay Attention to Firewall Management
  • Child Online Safety
    • Risks Involved Online
      • Misdirected Searches
      • Stealth Sites and Misleading URLs
      • Child Pornography, Grooming, and Cyberbullying
    • Role of the Internet in Child Pornography
    • Effects of Pornography on Children
    • Risks Involved in Social Networking Websites
    • Unsolicited Emails
    • Chat Rooms
    • Finding if Children are at Risk Online
    • Protecting Children from Online Threats
    • Encourage Children to Report
    • How to Report a Crime
    • Security Software for Protecting Children from Online Threats
      • KidZui
    • Actions To Take When the Child Becomes an Online Victim
  • Internet Laws
    • Children’s Online Privacy Protection Act (COPPA)
    • The Digital Millennium Copyright Act
    • Highlights of DMCA
    • CAN-SPAM Act
    • Computer Misuse Act 1990
  • Internet Security Checklists
  • Checklist for Parents to Protect Their Child from Online Threats

SCUS Module 07: Securing Network Connections

  • Home and Wireless Networks
    • Home Network
      • Network Devices
      • Steps for Home Networking
    • Wireless Networks
  • Setting Up a Wireless Network
    • Setting Up a Wireless Network in Windows 7
    • Changing Wireless Networking Configuration in Windows 7
    • Setting Up a Wireless Network in Mac
    • Changing Wireless Networking Configuration in Mac
  • Wireless Network Security
    • Common Threats to Wireless Network
    • Securing Wireless Network
  • Using the Network with Windows 7
    • Setting Up the PC’s Name and Workgroup Name in Windows 7
    • Sharing
    • Transferring Files
    • Simple File Sharing in Windows 7
    • Hiding a Shared Disk or Folder
    • How to Share Printer in Windows 7?
    • Using Printers on Other PC’s
    • Accessing Files on Other PCs
    • Windows Easy Transfer
  • Using the Network with MAC OS X
    • Setting Up the PC’s Name in MAC OS X
    • Setting Up the Workgroup Name in MAC OS X
    • Creating User Accounts and Groups in MAC OS X
    • Sharing Files and Folders in Macintosh OS X
    • Printer Sharing in Macintosh OS X
    • Accessing Other Macs on Your Network
    • Network Security Threats
  • Securing Network Connections
    • Use Firewall
    • Use Antivirus Protection
    • Use Strong Passwords, Make Regular Backups, and Know about Encryption
    • Identify a Secure Website
    • General Security Practices for Home Networking
  • Network Adapters
    • Checking Network Adapter
    • Network Setup Wizard
    • How to Isolate Networking Problems (Windows 7): Network Adapter?
    • Network Adapter Status
  • Troubleshooting with Network Adapters
    • Network Adapter is Unplugged
    • Network Adapter Has Limited or No Connectivity
    • Network Adapter is Connected, but User Cannot Reach the Internet
  • Network Security Checklist

SCUS Module 08: Securing Online Transactions

  • Online Shopping
    • How Online Shopping Works?
  • Online Banking
  • Credit Card Payments
    • Types of Credit Card Frauds
    • Guidelines for Ensuring Credit Card Safety
  • Securing Online Transactions
    • Choosing a Secure Online Payment Service
    • Online Payment Services
  • SSL and the Padlock Symbol
    • What Does the SSL Show?
  • Identifying a Trustworthy Website
  • Identifying an Untrustworthy Website
  • McAfee’s SiteAdvisor
    • Rating Icons
  • Online Transactions Security Checklist

SCUS Module 09: Securing Email Communications

  • Introduction to Email Security
    • Email Threat Scenario 2011
    • How Various Email Systems Work?
    • Email Security
  • Email Security Threats
    • Malicious Email Attachments
      • Email Attachments: Caution
    • Spamming
      • Spamming Countermeasures
    • Anti-Spamming Tool: SPAMfighter
    • Hoax/Chain and Scam Emails
    • Nigerian Scam
  • Email Security Procedures
    • Email Security Control Layers
    • Email Security Procedures
      • Creating Strong Passwords
      • Alternate Email Address
      • Keep Me Signed In/Remember Me
      • Using HTTPS
      • Check for Last Account Activity
      • Scanning Email Attachments
      • Turn Off Preview Feature
      • Email Filtering: Avoiding Unwanted Emails
  • How to Obtain Digital Certificates?
    • Digitally Sign Your Emails
    • How to Obtain Digital Certificates?
    • Installing a Digital Certificate
    • Signing Your Emails
    • Microsoft Outlook Download Settings
  • Email Security Tools
    • Online Email Encryption Service: Lockbin
    • Email Security Tools
  • Email Communication Checklist
  • Email Security Checklist
  • Security Checklist for Checking Emails on Mobile

SCUS Module 10: Social Engineering and Identity Theft

  • Identity Theft Statistics 2011
  • Scenario
  • Identity Theft
    • What is Identity Theft?
    • Personal Information that Can be Stolen
    • How do Attackers Steal Identity?
    • What do Attackers do with Stolen Identity?
    • Identity Theft Example
  • Social Engineering
    • Social Engineering Example
    • Criminal as Phone Banker
    • Authority Support Example
    • Technical Support Example
    • Human-Based Social Engineering
    • Computer-Based Social Engineering
      • Computer-Based Social Engineering: Phishing
      • Phony Security Alerts
      • Computer-Based Social Engineering through Social Networking Websites
  • How to Find if You Are a Victim of Identity Theft
  • What to Do if Identity Is Stolen
  • Reporting Identity Theft
    • Federal Trade Commission
    • Internet Crime Complaint Center
    • Prosecuting Identity Theft
  • IP Hiding Tools
    • Hiding IP Address Using Quick Hide IP Tool
    • IP Address Hiding Tools
  • Identity Theft Protection Checklist
  • Computer Based Identity Theft Protection Checklist

SCUS Module 11: Security on Social Networking Sites

  • Introduction to Social Networking Sites
    • Social Networking Sites
    • What is a Profile?
    • Top Social Networking Sites
  • Social Networking Security Threats
    • Security Risks Involved in Social Networking Sites
      • Cyberbullying
      • Identity Theft
      • Phishing Scams
      • Malware Attacks
      • Site Flaws
      • Social Networking Threats to Minors
  • Staying Safe on Facebook
    • Facebook Privacy Settings
    • Profile Settings
    • Privacy Settings for Applications
    • Settings to Block Users
    • Recommended Actions for Facebook Search Settings
    • Facebook: Security Tips
  • Staying Safe on MySpace
    • Step 1: Go to “Account Settings”
    • Step 2: Check Settings for “Comments” and “Mail”
    • Step 3: Check Settings for “Friends Request” and “IM”
    • Step 4: Check Settings for Stream Settings
    • Step 5: Settings for Block Users By Age
  • Social Networking Security Checklist
  • Social Networking Security Checklist for Parents and Teachers

SCUS Module 12: Information Security and Legal Compliance

  • Health Insurance Portability and Accountability Act (HIPPA)
    • HIPAA Checklist
  • FERPA (Family Educational Rights and Privacy Act)
    • FERPA Checklist
  • PCI DSS (Payment Card Industry Data Security Standard )
    • PCI DSS Checklist

SCUS Module 13: Securing Mobile Devices

  • Introduction to Mobile Security
    • Mobile Device Security
    • Worldwide Smartphone Sales to End Users by Operating System in 2011  Market Shares
    • Mobile Phone Services
    • IMEI Number
  • Mobile Security Threats
    • Mobile Device Security Risks
    • Mobile Malware
    • Mobile Application Vulnerabilities
    • Threats to Bluetooth Devices
  • Mobile Security Procedure
    • Patching of Mobile Platforms and Applications
    • Avoid Mobile Device Theft
    • What to Do if Your Mobile is Lost or Stolen?
    • Use Power-on Authentication
    • Regularly Back Up Important Data
    • Use Encryption to Secure Data in Mobile Device
    • Enable Auto-Lock Feature
    • Install Only Signed Applications
    • Install Mobile Phone AntiVirus
    • Mobile Phone Anti-Virus Tools
    • Secure Bluetooth Connectivity
  • Securing iPhone and iPad
    • Enable Passcode Protection
    • Enable SIM PIN Protection
    • Enable Auto-Lock and Re-map Button
    • iPad Security
  • Securing BlackBerry and Windows 7 Mobile
    • BlackBerry: Setting Device Password
    • BlackBerry: Changing the Device Password
    • BlackBerry: Lock Your Device
    • BlackBerry: Device Password
    • BlackBerry Password Keeper
    • Encrypting Data on Your BlackBerry Device
    • Windows 7 Mobile: Use of PIN to Lock SIM Card
    • Windows 7 Mobile: Changing the Password of the Phone
  • Mobile Security Tools
    • Mobile Security Tools: PhoneBAK Anti-theft
    • Mobile Security Tools
  • Bluetooth Security Checklist
  • Mobile Phone Security Checklist

2. CyberSAFE (Securing Assets For End-Users)

Enquire For Price & Details

Course Overview

Prepare End-Users to be Security Savvy with Company Data

Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to understand security compliance considerations, social engineering, malware, and various other data security-related concepts. In this course, you will explore the hazards and pitfalls and learn how to use technology safely and securely.

There is an increasing reliance on workplace technologies and ensuring their proper use is critical to the protection of our information systems. This course is designed to meet the needs of all organizations, irrespective of size, industry, or geographic location.

Validate your knowledge of cybersecurity preparedness with a short assessment at the end of class.


Certified CyberSAFE

What You'll Learn

  • Identify many of the common risks involved in using conventional end-user technology
  • Identify the need for security.
  • Secure devices like desktops, laptops, smartphones, and more
  • Secure your use of the Internet
  • This course is designed for you as a non-technical end-user of computers, mobile devices, networks, and the Internet, to enable you to use technology more securely to minimize digital risks.

Who Needs to Attend

Information technology end-users


There are no prerequisites for this course.

Follow-On Courses

There are no follow-ons for this course.

Course Outline

  1. Identifying the Need for Security
  • Identify Security Compliance Requirements
  • Recognize Social Engineering
  1. Securing Devices
  • Maintain Physical Security of Devices
  • Use Passwords for Security
  • Protect Your Data
  • Identify and Mitigate Malware
  • Use Wireless Devices Securely
  1. Using the Internet Securely
  • Browse the Web Safely
  • Use Email Securely
  • Use Social Networking Securely
  • Use Cloud Services Securely

3. CyberSec First Responder: Threat Detection and Response

Enquire For Price & Details

Course Overview

Gain a broad view of how to respond to a cybersecurity incident while preparing for the CyberSec First Responder certification.

This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a computer security incident response team (CSIRT). The course introduces strategies, frameworks, methodologies, and tools to manage cybersecurity risks, identify various types of common threats, design and operate secure computing and networking environments, assess and audit the organization’s security, collect, and analyze cybersecurity intelligence, and handle incidents as they occur. The course also covers closely related information assurance topics such as auditing and forensics to provide a sound basis for a comprehensive approach to security aimed toward those on the front lines of defense.

In addition, this course can help students who are looking to fulfill DoD directive 8570.01 for information assurance (IA) training. This program is designed for personnel performing IA functions, establishing IA policies and implementing security measures and procedures for the Department of Defense and affiliated information systems and networks.


CyberSec First Responder: Threat Detection and Response (Exam CFR-101) certification

What You'll Learn

  • Assess information security risk in computing and network environments
  • Create an information assurance lifecycle process
  • Analyze threats to computing and network environments
  • Design secure computing and network environments
  • Operate secure computing and network environments
  • Assess the security posture within a risk management framework
  • Collect cybersecurity intelligence information
  • Analyze collected intelligence to define actionable response
  • Respond to cybersecurity incidents
  • Investigate cybersecurity incidents
  • Audit secure computing and network environments

Who Needs to Attend

Cybersecurity practitioners who perform job functions related to protecting and defending information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation

Prerequisites and Follow On Courses


  • Cybersecurity Foundations
  • Understanding Networking Fundamentals

Follow-On Courses

  • CyberSec First Responder: Threat Detection and Response
  • Certified Ethical Hacker v9
  • Troubleshooting TCP/IP Networks with Wireshark

Course Outline

  1. Assessing Information Security Risk
  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management


  1. Creating an Information Assurance Lifecycle Process
  • Evaluate Information Assurance Lifecycle Models
  • Align Information Security Operations to the Information Assurance Lifecycle
  • Align Information Assurance and Compliance Regulations


  1. Analyzing Threats to Computing and Network Environments
  • Identify Threat Analysis Models
  • Assess the Impact of Reconnaissance Incidents
  • Assess the Impact of Systems Hacking Attacks
  • Assess the Impact of Malware
  • Assess the Impact of Hijacking and Impersonation Attacks
  • Assess the Impact of DoS Incidents
  • Assess the Impact of Threats to Mobile Security
  • Assess the Impact of Threats to Cloud Security


  1. Designing Secure Computing and Network Environments
  • Information Security Architecture Design Principles
  • Design Access Control Mechanisms
  • Design Cryptographic Security Controls
  • Design Application Security
  • Design Computing Systems Security
  • Design Network Security


  1. Operating Secure Computing and Network Environments
  • Implement Change Management in Security Operations
  • Implement Monitoring in Security Operations


  1. Assessing the Security Posture Within a Risk Management Framework
  • Deploy a Vulnerability Management Platform
  • Conduct Vulnerability Assessments
  • Conduct Penetration Tests on Network Assets
  • Follow Up on Penetration Testing


  1. Collecting Cybersecurity Intelligence Information
  • Deploy a Security Intelligence Collection and Analysis Platform
  • Collect Data from Security Intelligence Sources


  1. Analyzing Cybersecurity Intelligence Information
  • Analyze Security Intelligence to Address Incidents
  • Use SIEM Tools for Analysis


  1. Responding to Cybersecurity Incidents
  • Deploy an Incident Handling and Response Architecture
  • Perform Real-Time Incident Handling Tasks
  • Prepare for Forensic Investigation


  1. Investigating Cybersecurity Incidents
  • Create a Forensic Investigation Plan
  • Securely Collect Electronic Evidence
  • Identify the Who, Why, and How of an Incident
  • Follow Up on the Results of an Investigation


  1. Auditing Secure Computing and Network Environments
  • Deploy a Systems and Processes Auditing Architecture
  • Prepare for Audits
  • Perform Audits Geared Toward the Information Assurance Lifecycle


Lab 1: Implementing a Threat Assessment Model

Lab 2: Examining Reconnaissance Incidents

Lab 3: Assessing the Impact of System Hijacking Attempts

Lab 4: Assessing the Impact of Malware

Lab 5: Assessing the Impact of Hijacking and Impersonation attacks

Lab 6: Assessing the Impact of DoS Incidents

Lab 7: Assessing the Impact of Threats to Mobile Devices

Lab 8: Designing Cryptographic Security Controls

Lab 9: Designing Application Security

Lab 10: Implementing Monitoring in Security Operations

Lab 11: Deploying a Vulnerability Management Platform

Lab 12: Conducting Vulnerability Assessments

Lab 13: Conducting Penetration Testing on Network Assets

Lab 14: Collecting and Analyzing Security Intelligence

Lab 15: Collecting Security Intelligence Data

Lab 16: Capturing and Analyzing Baseline Data

Lab 17: Analyzing Security Intelligence

Lab 18: Incorporating SIEMS into Security Intelligence Analysis

Lab 19: Developing an Incidence Response System

Lab 20: Securely Collecting Electronic Evidence

Lab 21: Analyzing Forensic Evidence

Lab 22: Preparing for an Audit

Lab 23: Performing Audits

Advance Courses

1. CompTIA Security

Enquire For Price & Details


Traditional Instructor Led Learning – 5.00 Day(s)


The CompTIA® Security+® (2011 Objectives) course is designed to help you prepare for the SY0-301 exam. Students will implement and monitor security on networks, applications, and operating systems, and respond to security breaches.

Who Should Attend

This course is targeted toward an Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as OS X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security ics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

At Course Completion

Upon successful completion of this course, students will be able to: – identify the fundamental concepts of computer security. – identify security threats and vulnerabilities. – examine network security. – manage application, data and host security. – identify access control and account management security measures. – manage certificates. – identify compliance and operational security measures. – manage risk. – manage security incidents. – develop business continuity and disaster recovery plans.

Course Outline

Lesson 1: Security Fundamentals
Information Security Cycle
Information Security Controls
Authentication Methods
Cryptography Fundamentals
Security Policy Fundamentals

Lesson 2: Security Threats and Vulnerabilities
Social Engineering
Physical Threats and Vulnerabilities
Network-Based Threats
Wireless Threats and Vulnerabilities
Software Based Threats

Lesson 3: Network Security
Network Devices and Technologies
Network Design Elements and Components
Implement Networking Protocols
Apply Network Security Administration Principles
Secure Wireless Traffic

Lesson 4: Managing Application, Data and Host Security
Establish Device/Host Security
Application Security
Data Security
Mobile Security

Lesson 5: Access Control, Authentication, and Account Management
Access Control and Authentication Services
Implement Account Management Security Controls

Lesson 6: Managing Certificates
Install a Certificate Authority (CA) Hierarchy
Enroll Certificates
Secure Network Traffic by Using Certificates
Renew Certificates
Revoke Certificates
Back Up and Restore Certificates and Private Keys
Restore Certificates and Private Keys

Lesson 7: Compliance and Operational Security
Physical Security
Legal Compliance
Security Awareness and Training

Lesson 8: Risk Management
Risk Analysis
Implement Vulnerability Assessment Tools and Techniques
Scan for Vulnerabilities
Mitigation and Deterrent Techniques

Lesson 9: Managing Security Incidents
Respond to Security Incidents
Recover from a Security Incident

Lesson 10: Business Continuity and Disaster Recovery Planning
Business Continuity
Plan for Disaster Recovery
Execute Disaster Recovery Plans and Procedures

2. Certified Ethical Hacker v9

Enquire For Price & Details

Course Overview

This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers.

Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

In short, you walk out the door with advanced hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification!

A snapshot of what’s new in CEH version 9 Course?

  • Focus on New Attack Vectors
    • Emphasis on Cloud Computing Technology
      • CEHv9 focuses on various threats and hacking attacks to the emerging cloud computing technology
      • Covers wide-ranging countermeasures to combat cloud computing attacks
      • Provides a detailed pen testing methodology for cloud systems to identify threats in advance
    • Emphasis on Mobile Platforms and Tablet Computers
      • CEHv9 focuses on the latest hacking attacks targeted to mobile platform and tablet computers and covers countermeasures to secure mobile infrastructure
      • Coverage of latest development in mobile and  web technologies
  • New Vulnerabilities Are Addressed
    • Heartbleed CVE-2014-0160
      • Heartbleed makes the SSL layer used by millions of websites and thousands of cloud providers vulnerable.
      • Detailed coverage and labs in Module 18: Cryptography.
    • Shellshock CVE-2014-6271
      • Shellshock exposes vulnerability in Bash, the widely-used shell for Unix-based operating systems such as Linux and OS X.
      • Detailed coverage and labs in Module 11: Hacking Webservers
    • Poodle CVE-2014-3566
      • POODLE lets attackers decrypt SSLv3 connections and hijack the cookie session that identifies you to a service, allowing them to control your account without needing your password.
      • Case study in Module 18: Cryptography
    • Hacking Using Mobile Phones
      • CEHv9 focuses on performing hacking (Foot printing, scanning, enumeration, system hacking, sniffing, DDoS attack, etc.) using mobile phones
      • Courseware covers latest mobile hacking tools in all the modules
    • Coverage of latest Trojan, Virus, Backdoors
    • Courseware covers Information Security Controls and Information Security Laws and Standards
    • Labs on Hacking Mobile Platforms and Cloud Computing
    • More than 40 percent new labs are added from Version 8
    • More than 1500 new/updated tools
    • CEHv9 program focuses on addressing security issues to the latest operating systems like Windows 8.1
    • It also focuses on addressing the existing threats to operating environments dominated by Windows 7, Windows 8, and other operating systems (backward compatibility)

Who is it for?

The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.


 5 Days (9:00 AM – 5:00 PM)

Exam Info

  • Number of Questions: 125
  • Passing Score: 70%
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice
  • Test Delivery: ECC EXAM, VUE
  • Exam Prefix: ?312-50 (ECC EXAM), 312-50 (VUE)

How is this Course Different

What makes the Ethical Hacking and Countermeasures course different from other courses in the market?

The Ethical Hacking and Countermeasures course prepares candidates for the CEH exam offered by EC-Council. The course focuses on hacking techniques and technology from an offensive perspective. The advanced security course is regularly updated to reflect latest developments in the domain, including new hacking techniques, exploits, automated programs as well as defensive recommendations as outlined by experts in the field. The CEH body of knowledge represents detailed contributions from security experts, academicians, industry practitioners and the security community at large.

What is the Employment Value of CEH?

The ANSI accredited Ethical Hacking program is primarily targeted at security professionals who want to acquire a well rounded body of knowledge to have better opportunities in this field. Acquiring a CEH means the candidate has a minimum baseline knowledge of security threats, risks and countermeasures. Organizations can rest assured that they have a candidate who is more than a systems administrator, a security auditor, a hacking tool analyst or a vulnerability tester. The candidate is assured of having both business and technical knowledge.


Updated Content

  • CEH v8 contains completely updated content on rapidly evolving security scenario and attack mechanisms

New Hacks

  • CEH v8 provides insights on new hacking techniques, networked environment and organized cybercrime

Hacking Tools

  • CEH v8 showcases thousands of Hacking tools including password cracker, spyware, live Trojans and viruses.

Security Tools

  • CEH v8 provides a detailed description of different industry-standard securitytools. Other tools are listed for testing by students in a lab environment.

Legal Agreement

  • Ethical Hacking and Countermeasures course mission is to educate, introduce anddemonstrate hacking tools for penetration testing purposes only. Prior to attending thiscourse, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent. Not anyone can be a student — the Accredited Training Centers (ATC) will make sure the applicants work for legitimate companies.

Course Content

Introduction to Ethical Hacking

  • Internet is Integral Part of Business and Personal Life – What Happens Online in 60 Seconds
  • Information Security Overview
    • Case Study
      • eBay Data Breach
      • Google Play Hack
      • The Home Depot Data Breach
    • Year of the Mega Breach
    • Data Breach Statistics
    • Malware Trends in 2014
    • Essential Terminology
    • Elements of Information Security
    • The Security, Functionality, and Usability Triangle
  • Information Security Threats and Attack Vectors
    • Motives, Goals, and Objectives of Information Security Attacks
    • Top Information Security Attack Vectors
    • Information Security Threat Categories
    • Types of Attacks on a System
      • Operating System Attacks
        • Examples of OS Vulnerabilities
      • Misconfiguration Attacks
      • Application-Level Attacks
        • Examples of Application-Level Attacks
      • Shrink Wrap Code Attacks
    • Information Warfare
  • Hacking Concepts, Types, and Phases
  • Hacking Concepts, Types, and Phases
    • What is Hacking
    • Who is a Hacker?
    • Hacker Classes
    • Hacking Phases
      • Reconnaissance
      • Scanning
      • Gaining Access
      • Maintaining Access
      • Clearing Tracks
    • Ethical Hacking Concepts and Scope
      • What is Ethical Hacking?
      • Why Ethical Hacking is Necessary
      • Scope and Limitations of Ethical Hacking
      • Skills of an Ethical Hacker
    • Information Security Controls
      • Information Assurance (IA)
      • Information Security Management Program
      • Threat Modeling
      • Enterprise Information Security Architecture (EISA)
      • Network Security Zoning
      • Defense in Depth
      • Information Security Policies
        • Types of Security Policies
        • Examples of Security Policies
        • Privacy Policies at Workplace
        • Steps to Create and Implement Security Policies
        • HR/Legal Implications of Security Policy Enforcement
      • Physical Security
        • Physical Security Controls
      • Incident Management
        • Incident Management Process
        • Responsibilities of an Incident Response Team
      • What is Vulnerability Assessment?
        • Types of  Vulnerability Assessment
        • Network Vulnerability Assessment Methodology
        • Vulnerability Research
        • Vulnerability Research Websites
      • Penetration Testing
        • Why Penetration Testing
        • Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
        • Blue Teaming/Red Teaming
        • Types of Penetration Testing
        • Phases of Penetration Testing
        • Security Testing Methodology
        • Penetration Testing Methodology
      • Information Security Laws and Standards
        • Payment Card Industry Data Security Standard (PCI-DSS)
        • ISO/IEC 27001:2013
        • Health Insurance Portability and Accountability Act (HIPAA)
        • Sarbanes Oxley Act (SOX)
        • The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)
        • Cyber Law in Different Countries


Footprinting and Reconnaissance

  • Footprinting Concepts
    • What is Footprinting?
    • Objectives of Footprinting
  • Footprinting Methodology
    • Footprinting through Search Engines
      • Finding Company’s Public and Restricted Websites
      • Determining the Operating System
      • Collect Location Information
      • People Search: Social Networking Services
      • People Search Online Services
      • Gather Information from Financial Services
      • Footprinting through Job Sites
      • Monitoring Target Using Alerts
      • Information Gathering Using Groups, Forums, and Blogs
    • Footprinting using Advanced Google Hacking Techniques
      • Google Advance Search Operators
      • Finding Resources Using Google Advance Operator
      • Google Hacking Database (GHDB)
      • Information Gathering Using Google Advanced Search
    • Footprinting through Social Networking Sites
      • Collect Information through Social Engineering on Social Networking Sites
      • Information Available on Social Networking Sites
    • Website Footprinting
      • Website Footprinting using Web Spiders
      • Mirroring Entire Website
        • Website Mirroring Tools
      • Extract Website Information from
      • Monitoring Web Updates Using Website Watcher
        • Web Updates Monitoring Tools
      • Email Footprinting
        • Tracking Email Communications
          • Collecting Information from Email Header
          • Email Tracking Tools
        • Competitive Intelligence
          • Competitive Intelligence Gathering
          • Competitive Intelligence – When Did this Company Begin?  How Did it Develop?
          • Competitive Intelligence – What Are the Company’s Plans?
          • Competitive Intelligence – What Expert Opinions Say About the Company
          • Monitoring Website Traffic of Target Company
          • Tracking Online Reputation of the Target
            • Tools for Tracking Online Reputation of the Target
          • WHOIS Footprinting
            • WHOIS Lookup
            • WHOIS Lookup Result Analysis
            • WHOIS Lookup Tools
            • WHOIS Lookup Tools for Mobile
          • DNS Footprinting
            • Extracting DNS Information
            • DNS Interrogation Tools
          • Network Footprinting
            • Locate the Network Range
            • Traceroute
            • Traceroute Analysis
            • Traceroute Tools
          • Footprinting through Social Engineering
            • Footprinting through Social Engineering
            • Collect Information Using Eavesdropping, Shoulder Surfing, and Dumpster Diving
          • Footprinting Tools
            • Footprinting Tool
              • Maltego
              • Recon-ng
            • Additional Footprinting Tools
          • Footprinting Countermeasures
          • Footprinting Penetration Testing
            • Footprinting Pen Testing
            • Footprinting Pen Testing Report Templates


Scanning Networks

  • Overview of Network Scanning
    • TCP Communication Flags
    • TCP/IP Communication
    • Creating Custom Packet Using TCP Flags
  • CEH Scanning Methodology
    • Check for Live Systems
      • Checking for Live Systems – ICMP Scanning
      • Ping Sweep
        • Ping Sweep Tools
      • Check for Open Ports
        • SSDP Scanning
        • Scanning IPv6 Network
        • Scanning Tool
          • Nmap
          • Hping2 / Hping3
          • Hping Commands
        • Scanning Techniques
          • TCP Connect / Full Open Scan
          • Stealth Scan (Half-open Scan)
          • Inverse TCP Flag Scanning
          • Xmas Scan
          • ACK Flag Probe Scanning
          • IDLE/IPID Header Scan
            • IDLE Scan: Step 1
            • IDLE Scan: Step 2 and 3
          • UDP Scanning
          • ICMP Echo Scanning/List Scan
        • Scanning Tool: NetScan Tools Pro
        • Scanning Tools
        • Scanning Tools for Mobile
        • Port Scanning Countermeasures
      • Scanning Beyond IDS
        • IDS Evasion Techniques
        • SYN/FIN Scanning Using IP Fragments
      • Banner Grabbing
        • Banner Grabbing Tools
        • Banner Grabbing Countermeasures
          • Disabling or Changing Banner
          • Hiding File Extensions from Web Pages
        • Scan for Vulnerability
          • Vulnerability Scanning
          • Vulnerability Scanning Tool
            • Nessus
            • GAFI LanGuard
            • Qualys FreeScan
          • Network Vulnerability Scanners
          • Vulnerability Scanning Tools for Mobile
        • Draw Network Diagrams
          • Drawing Network Diagrams
          • Network Discovery Tool
            • Network Topology Mapper
            • OpManager and NetworkView
          • Network Discovery and  Mapping Tools
          • Network Discovery Tools for Mobile
        • Prepare Proxies
          • Proxy Servers
          • Proxy Chaining
          • Proxy Tool
            • Proxy Switcher
            • Proxy Workbench
            • TOR and CyberGhost
          • Proxy Tools
          • Proxy Tools for Mobile
          • Free Proxy Servers
          • Introduction to Anonymizers
            • Censorship Circumvention Tool: Tails
            • G-Zapper
            • Anonymizers
            • Anonymizers for Mobile
          • Spoofing IP Address
          • IP Spoofing Detection Techniques
            • Direct TTL Probes
            • IP Identification Number
          • TCP Flow Control Method
          • IP Spoofing Countermeasures
        • Scanning Pen Testing



  • Enumeration Concepts
    • What is Enumeration?
    • Techniques for Enumeration
    • Services and Ports to Enumerate
  • NetBIOS Enumeration
    • NetBIOS Enumeration Tool
      • SuperScan
      • Hyena
      • Winfingerprint
      • NetBIOS Enumerator and Nsauditor Network Security Auditor
    • Enumerating User Accounts
    • Enumerating Shared Resources Using Net View
  • SNMP Enumeration
    • Working of SNMP
    • Management Information Base (MIB)
    • SNMP Enumeration Tool
      • OpUtils
      • Engineer’s Toolset
    • SNMP Enumeration Tools
  • LDAP Enumeration
    • LDAP Enumeration Tool: Softerra LDAP Administrator
    • LDAP Enumeration Tools
  • NTP Enumeration
    • NTP Enumeration Commands
    • NTP Enumeration Tools
  • SMTP Enumeration
    • SMTP Enumeration Tool: NetScanTools Pro
    • Telnet Enumeration
    • DNS Zone Transfer Enumeration Using NSLookup
  • Enumeration Countermeasures
  • SMB Enumeration Countermeasures
  • Enumeration Pen Testing


System Hacking

  • Information at Hand Before System Hacking Stage
  • System Hacking: Goals
  • CEH Hacking Methodology (CHM)
  • CEH System Hacking Steps
    • Cracking Passwords
      • Password Cracking
      • Types of Password Attacks
      • Non-Electronic Attacks
      • Active Online Attack
        • Dictionary, Brute Forcing and Rule-based Attack
        • Password Guessing
      • Default Passwords
      • Active Online Attack:
        • Trojan/Spyware/Keylogger
        • Example of Active Online Attack Using USB Drive
        • Hash Injection Attack
      • Passive Online Attack
        • Wire Sniffing
        • Man-in-the-Middle and Replay Attack
      • Offline Attack
        • Rainbow Attacks
          • Tools to Create Rainbow Tables: rtgen and Winrtgen
        • Distributed Network Attack
      • Elcomsoft Distributed Password Recovery
      • Microsoft Authentication
      • How Hash Passwords Are Stored in Windows SAM?
        • NTLM Authentication Process
        • Kerberos Authentication
      • Password Salting
      • pwdump7 and fgdump
      • Password Cracking Tools
        • L0phtCrack and Ophcrack
        • Cain & Abel and RainbowCrack
      • Password Cracking Tools
      • Password Cracking Tool for Mobile: FlexiSPY Password Grabber
      • How to Defend against Password Cracking
      • Implement and Enforce Strong Security Policy
      • CEH System Hacking Steps
    • Escalating Privileges
      • Privilege Escalation
      • Privilege Escalation Using DLL Hijacking
      • Privilege Escalation Tool: Active@ Password Changer
      • Privilege Escalation Tools
      • How to Defend Against Privilege Escalation
    • Executing Applications
      • RemoteExec
      • PDQ Deploy
      • DameWare Remote Support
      • Keylogger
        • Types of Keystroke Loggers
        • Hardware Keyloggers
        • Keylogger: All In One Keylogger
        • Keyloggers for Windows
        • Keylogger for Mac: Amac Keylogger for Mac
        • Keyloggers for MAC
      • Spyware
        • Spyware: Spytech SpyAgent
        • Spyware: Power Spy 2014
        • What Does the Spyware Do?
        • Spyware
        • USB Spyware: USBSpy
        • Audio Spyware: Spy Voice Recorder and Sound Snooper
        • Video Spyware: WebCam Recorder
        • Cellphone Spyware: Mobile Spy
        • Telephone/Cellphone Spyware
        • GPS Spyware: SPYPhone
        • GPS Spyware
      • How to Defend Against Keyloggers
        • Anti-Keylogger: Zemana AntiLogger
        • Anti-Keylogger
      • How to Defend Against Spyware
        • Anti-Spyware: SUPERAntiSpyware
        • Anti-Spyware
      • Hiding Files
        • Rootkits
          • Types of Rootkits
          • How Rootkit Works
          • Rootkit
            • Avatar
            • Necurs
            • Azazel
            • ZeroAccess
          • Detecting Rootkits
            • Steps for Detecting Rootkits
            • How to Defend against Rootkits
            • Anti-Rootkit: Stinger and UnHackMe
            • Anti-Rootkits
          • NTFS Data Stream
            • How to Create NTFS Streams
            • NTFS Stream Manipulation
            • How to Defend against NTFS Streams
            • NTFS Stream Detector: StreamArmor
            • NTFS Stream Detectors
          • What Is Steganography?
            • Classification of Steganography
            • Types of Steganography based on Cover Medium
              • Whitespace Steganography Tool: SNOW
              • Image Steganography
              • Least Significant Bit Insertion
              • Masking and Filtering
              • Algorithms and Transformation
              • Image Steganography: QuickStego
              • Image Steganography Tools
              • Document Steganography: wbStego
              • Document Steganography Tools
              • Video Steganography
              • Video Steganography: OmniHide PRO and Masker
              • Video Steganography Tools
              • Audio Steganography
              • Audio Steganography: DeepSound
              • Audio Steganography Tools
              • Folder Steganography: Invisible Secrets 4
              • Folder Steganography Tools
              • Spam/Email Steganography: Spam Mimic
            • Steganography Tools for Mobile Phones
          • Steganalysis
            • Steganalysis Methods/Attacks on Steganography
            • Detecting Text and Image Steganography
            • Detecting Audio and Video Steganography
            • Steganography Detection Tool: Gargoyle Investigator™ Forensic Pro
            • Steganography Detection Tools
          • Covering Tracks
            • Covering Tracks
            • Disabling Auditing: Auditpol
            • Clearing Logs
            • Manually Clearing Event Logs
            • Ways to Clear Online Tracks
            • Covering Tracks Tool: CCleaner
            • Covering Tracks Tool: MRU-Blaster
            • Track Covering Tools
          • Penetration Testing
            • Password Cracking
            • Privilege Escalation
            • Executing Applications
            • Hiding Files
            • Covering Tracks


Malware Threats

  • Introduction to Malware
    • Different Ways a Malware can Get into a System
    • Common Techniques Attackers Use to Distribute Malware on the Web
  • Trojan Concepts
    • Financial Loss Due to Trojans
    • What is a Trojan?
    • How Hackers Use Trojans
    • Common Ports used by Trojans
    • How to Infect Systems Using a Trojan
    • Wrappers
    • Dark Horse Trojan Virus Maker
    • Trojan Horse Construction Kit
    • Crypters: AIO FUD Crypter, Hidden Sight Crypter, and Galaxy Crypter
    • Crypters: Criogenic Crypter, Heaven Crypter, and SwayzCryptor
    • How Attackers Deploy a Trojan
      • Exploit Kit
      • Exploit Kit: Infinity
      • Exploit Kits: Phoenix Exploit Kit and Blackhole Exploit Kit
      • Exploit Kits: Bleedinglife and Crimepack
    • Evading Anti-Virus Techniques
  • Types of Trojans
    • Command Shell Trojans
    • Defacement Trojans
    • Defacement Trojans: Restorator
    • Botnet Trojans
      • Tor-based Botnet Trojans: ChewBacca
      • Botnet Trojans: Skynet and CyberGate
    • Proxy Server Trojans
      • Proxy Server Trojan: W3bPrOxy Tr0j4nCr34t0r (Funny Name)
    • FTP Trojans
    • VNC Trojans
      • VNC Trojans: WinVNC and VNC Stealer
    • HTTP/HTTPS Trojans
      • HTTP Trojan: HTTP RAT
    • Shttpd Trojan – HTTPS (SSL)
    • ICMP Tunneling
    • Remote Access Trojans
      • Optix Pro and MoSucker
      • BlackHole RAT and SSH – R.A.T
      • njRAT and Xtreme RAT
      • SpyGate – RAT and Punisher RAT
      • DarkComet RAT, Pandora RAT, and HellSpy RAT
      • ProRat and Theef
      • Hell Raiser
      • Atelier Web Remote Commander
    • Covert Channel Trojan: CCTT
    • E-banking Trojans
      • Working of E-banking Trojans
      • E-banking Trojan
        • ZeuS and SpyEye
        • Citadel Builder and Ice IX
      • Destructive Trojans: M4sT3r Trojan
      • Notification Trojans
      • Data Hiding Trojans (Encrypted Trojans)
    • Virus and Worms Concepts
      • Introduction to Viruses
      • Stages of  Virus Life
      • Working of  Viruses:
        • Infection Phase
        • Attack Phase
      • Why Do People Create Computer Viruses
      • Indications of Virus Attack
      • Virus Hoaxes and Fake Antiviruses
      • Ransomware
      • Types of Viruses
        • System or Boot Sector Viruses
        • File and Multipartite Viruses
        • Macro Viruses
        • Cluster Viruses
        • Stealth/Tunneling Viruses
        • Encryption Viruses
        • Polymorphic Code
        • Metamorphic Viruses
        • File Overwriting or Cavity Viruses
        • Sparse Infector Viruses
        • Companion/Camouflage Viruses
        • Shell Viruses
        • File Extension Viruses
        • Add-on and Intrusive Viruses
        • Transient and Terminate and Stay Resident Viruses
      • Writing a Simple Virus Program
        • Sam’s Virus Generator and JPS Virus Maker
        • Andreinick05’s Batch Virus Maker and DeadLine’s Virus Maker
        • Sonic Bat – Batch File Virus Creator and Poison Virus Maker
      • Computer Worms
        • How Is a Worm Different from a Virus?
        • Computer Worms: Ghost Eye Worm
        • Worm Maker: Internet Worm Maker Thing
      • Malware Reverse Engineering
        • What is Sheep Dip Computer?
        • Anti-Virus Sensor Systems
        • Malware Analysis Procedure: Preparing Testbed
        • Malware Analysis Procedure
        • Malware Analysis Tool: IDA Pro
        • Online Malware Testing: VirusTotal
        • Online Malware Analysis Services
        • Trojan Analysis: Neverquest
        • Virus Analysis: Ransom Cryptolocker
        • Worm Analysis: Darlloz (Internet of Things (IoT) Worm)
      • Malware Detection
        • How to Detect Trojans
          • Scanning for Suspicious Ports
            • Tools: TCPView and CurrPorts
          • Scanning for Suspicious Processes
            • Process Monitoring Tool: What’s Running
            • Process Monitoring Tools
          • Scanning for Suspicious Registry Entries
            • Registry Entry Monitoring Tool: RegScanner
            • Registry Entry Monitoring Tools
          • Scanning for Suspicious Device Drivers
            • Device Drivers Monitoring Tool: DriverView
            • Device Drivers Monitoring Tools
          • Scanning for Suspicious Windows Services
            • Windows Services Monitoring Tool: Windows Service Manager (SrvMan)
            • Windows Services Monitoring Tools
          • Scanning for Suspicious Startup Programs
            • Windows 8 Startup Registry Entries
            • Startup Programs Monitoring Tool: Security AutoRun
            • Startup Programs Monitoring Tools
          • Scanning for Suspicious Files and Folders
            • Files and Folder Integrity Checker: FastSum and WinMD5
            • Files and Folder Integrity Checker
          • Scanning for Suspicious Network Activities
          • Detecting Trojans and Worms with Capsa Network Analyzer
        • Virus Detection Methods
      • Countermeasures
        • Trojan Countermeasures
        • Backdoor Countermeasures
        • Virus and Worms Countermeasures
      • Anti-Malware Software
        • Anti-Trojan Software
          • TrojanHunter
          • Emsisoft Anti-Malware
        • Anti-Trojan Software
        • Companion Antivirus: Immunet
        • Anti-virus Tools
      • Penetration Testing
        • Pen Testing for Trojans and Backdoors
        • Penetration Testing for Virus



  • Sniffing Concepts
    • Network Sniffing and Threats
    • How a Sniffer Works
    • Types of Sniffing
      • Passive Sniffing
      • Active Sniffing
    • How an Attacker Hacks the Network Using Sniffers
    • Protocols Vulnerable to Sniffing
    • Sniffing in the Data Link Layer of the OSI Model
    • Hardware Protocol Analyzer
    • Hardware Protocol Analyzers
    • SPAN Port
    • Wiretapping
    • Lawful Interception
    • Wiretapping Case Study: PRISM
  • MAC Attacks
    • MAC Address/CAM Table
    • How CAM Works
    • What Happens When CAM Table Is Full?
    • MAC Flooding
    • Mac Flooding Switches with macof
    • Switch Port Stealing
    • How to Defend against MAC Attacks
  • DHCP Attacks
    • How DHCP Works
    • DHCP Request/Reply Messages
    • IPv4 DHCP Packet Format
    • DHCP Starvation Attack
    • DHCP Starvation Attack Tools
    • Rogue DHCP Server Attack
    • How to Defend Against DHCP Starvation and Rogue Server Attack
  • ARP   Poisoning
    • What Is Address Resolution Protocol (ARP)?
    • ARP Spoofing Attack
    • How Does ARP Spoofing Work
    • Threats of ARP Poisoning
    • ARP Poisoning Tool
      • Cain & Abel and WinArpAttacker
      • Ufasoft Snif
    • How to Defend Against ARP Poisoning
    • Configuring DHCP Snooping and Dynamic ARP Inspection on Cisco Switches
    • ARP Spoofing Detection: XArp
  • Spoofing Attack
    • MAC Spoofing/Duplicating
    • MAC Spoofing Technique: Windows
    • MAC Spoofing Tool: SMAC
    • IRDP Spoofing
    • How to Defend Against MAC Spoofing
  • DNS Poisoning
    • DNS Poisoning Techniques
    • Intranet DNS Spoofing
    • Internet DNS Spoofing
    • Proxy Server DNS Poisoning
    • DNS Cache Poisoning
    • How to Defend Against DNS Spoofing
  • Sniffing Tools
  • Sniffing Tool: Wireshark
  • Follow TCP Stream in Wireshark
  • Display Filters in Wireshark
  • Additional Wireshark Filters
  • Sniffing Tool
    • SteelCentral Packet Analyzer
    • Tcpdump/Windump
  • Packet Sniffing Tool: Capsa Network Analyzer
  • Network Packet Analyzer
    • OmniPeek Network Analyzer
    • Observer
    • Sniff-O-Matic
  • TCP/IP Packet Crafter: Colasoft Packet Builder
  • Network Packet Analyzer: RSA NetWitness Investigator
  • Additional Sniffing Tools
  • Packet Sniffing Tools for Mobile: Wi.cap. Network Sniffer Pro and FaceNiff
  • Counter measures
    • How to Defend Against Sniffing
  • Sniffing Detection Techniques
    • How to Detect Sniffing
    • Sniffer Detection Technique
      • Ping Method
      • ARP Method
      • DNS Method
    • Promiscuous Detection Tool
      • PromqryUI
      • Nmap
    • Sniffing Pen Testing



Social Engineering

  • Social Engineering Concepts
    • What is Social Engineering?
    • Behaviors Vulnerable to Attacks
    • Factors that Make Companies Vulnerable to Attacks
    • Why Is Social Engineering Effective?
    • Warning Signs of an Attack
    • Phases in a Social Engineering Attack
  • Social Engineering Techniques
    • Types of Social Engineering
      • Human-based Social Engineering
      • Impersonation
        • Impersonation Scenario
          • Over-Helpfulness of Help Desk
          • Third-party Authorization
          • Tech Support
          • Internal Employee/Client/Vendor
          • Repairman
          • Trusted Authority Figure
        • Eavesdropping and Shoulder Surfing
        • Dumpster Diving
        • Reverse Social Engineering, Piggybacking, and Tailgating
      • Watch these Movies
      • Watch this Movie
      • Computer-based Social Engineering
        • Phishing
        • Spear Phishing
      • Mobile-based Social Engineering
        • Publishing Malicious Apps
        • Repackaging Legitimate Apps
        • Fake Security Applications
        • Using SMS
      • Insider Attack
      • Disgruntled Employee
      • Preventing Insider Threats
      • Common Social Engineering Targets and Defense Strategies
    • Impersonation on Social Networking Sites
      • Social Engineering Through Impersonation on Social Networking Sites
      • Social Engineering on Facebook
      • Social Engineering on LinkedIn and Twitter
      • Risks of Social Networking to Corporate Networks
    • Identity Theft
      • Identity Theft Statistics
      • Identify Theft
      • How to Steal an Identity
        • STEP 1
        • STEP 2
        • Comparison
        • STEP 3
      • Real Steven Gets Huge Credit Card Statement
      • Identity Theft – Serious Problem
    • Social Engineering Countermeasures
      • How to Detect Phishing Emails
      • Anti-Phishing Toolbar
        • Netcraft
        • PhishTank
      • Identity Theft Countermeasures
    • Penetration Testing
      • Social Engineering Pen Testing
        • Using Emails
        • Using Phone
        • In Person
        • Social Engineering Toolkit (SET)



  • DoS/DDoS Concepts
    • DDoS Attack Trends
    • What is a Denial of Service Attack?
    • What Are Distributed Denial of Service Attacks?
    • How Distributed Denial of Service Attacks Work
  • DoS/DDoS Attack Techniques
    • Basic Categories of DoS/DDoS Attack Vectors
    • DoS/DDoS Attack Techniques
      • Bandwidth Attacks
      • Service Request Floods
      • SYN Attack
      • SYN Flooding
      • ICMP Flood Attack
      • Peer-to-Peer Attacks
      • Permanent Denial-of-Service Attack
      • Application Level Flood Attacks
      • Distributed Reflection Denial of Service (DRDoS)
    • Botnets
      • Organized Cyber Crime: Organizational Chart
      • Botnet
      • A Typical Botnet Setup
      • Botnet Ecosystem
      • Scanning Methods for Finding Vulnerable Machines
      • How Malicious Code Propagates?
      • Botnet Trojan
        • Blackshades NET
        • Cythosia Botnet and Andromeda Bot
        • PlugBot
      • DDoS Case Study
        • DDoS Attack
        • Hackers Advertise Links to Download Botnet
      • DoS/DDoS Attack Tools
        • Pandora DDoS Bot Toolkit
        • Dereil and HOIC
        • DoS HTTP and BanglaDos
        • DoS and DDoS Attack Tools
        • DoS and DDoS Attack Tool for Mobile
          • AnDOSid
          • Low Orbit Ion Cannon (LOIC)
        • Counter-measures
          • Detection Techniques
          • Activity Profiling
          • Wavelet Analysis
          • Sequential Change-Point Detection
          • DoS/DDoS Countermeasure Strategies
          • DDoS Attack Countermeasures
            • Protect Secondary Victims
            • Detect and Neutralize Handlers
            • Detect Potential Attacks
            • Deflect Attacks
            • Mitigate Attacks
          • Post-Attack Forensics
          • Techniques to Defend against Botnets
          • DoS/DDoS Countermeasures
          • DoS/DDoS Protection at ISP Level
          • Enabling  TCP Intercept on Cisco IOS Software
          • Advanced DDoS Protection Appliances
        • DoS/DDoS Protection Tools
          • DoS/DDoS Protection Tool: FortGuard Anti-DDoS Firewall 2014
          • DoS/DDoS Protection Tools
        • DoS/DDoS Attack Penetration Testing


Session Hijacking

  • Session Hijacking Concepts
    • What is Session Hijacking?
    • Why Session Hijacking is Successful?
    • Session Hijacking Process
    • Packet Analysis of a Local Session Hijack
    • Types of Session Hijacking
    • Session Hijacking in OSI Model
    • Spoofing vs. Hijacking
  • Application Level Session Hijacking
    • Compromising Session IDs using Sniffing
    • Compromising Session IDs by Predicting Session Token
    • How to Predict a Session Token
    • Compromising Session IDs Using Man-in-the-Middle Attack
    • Compromising Session IDs Using Man-in-the-Browser Attack
    • Steps to Perform Man-in-the-Browser Attack
    • Compromising Session IDs Using Client-side Attacks
    • Compromising Session IDs Using Client-side Attacks: Cross-site Script Attack
    • Compromising Session IDs Using Client-side Attacks: Cross-site Request Forgery Attack
    • Compromising Session IDs Using Session Replay Attack
    • Compromising Session IDs Using Session Fixation
    • Session Fixation Attack
    • Session Hijacking Using Proxy Servers
  • Network-level Session Hijacking
    • The 3-Way Handshake
    • TCP/IP Hijacking
    • TCP/IP Hijacking Process
    • IP Spoofing: Source Routed Packets
    • RST Hijacking
    • Blind Hijacking
    • MiTM Attack Using Forged ICMP and ARP Spoofing
    • UDP Hijacking
  • Session Hijacking Tools
    • Session Hijacking Tool
      • Zaproxy
      • Burp Suite and Hijack
    • Session Hijacking Tools
    • Session Hijacking Tools for Mobile: DroidSheep and DroidSniff
  • Counter-measures
    • Session Hijacking Detection Methods
    • Protecting against Session Hijacking
    • Methods to Prevent Session Hijacking
      • To be Followed by Web Developers
      • To be Followed by Web Users
    • Approaches Vulnerable to Session Hijacking and their Preventative Solutions
    • IPSec
    • Modes of IPsec
    • IPsec Architecture
    • IPsec Authentication and Confidentiality
    • Components of IPsec
  • Session Hijacking Pen Testing


Hacking Webservers

  • Webserver Concepts
    • Web Server Security Issue
    • Why Web Servers Are Compromised
    • Impact of  Webserver Attacks
    • Open Source Webserver Architecture
    • IIS Webserver Architecture
  • Webserver Attacks
    • DoS/DDoS Attacks
    • DNS Server Hijacking
    • DNS Amplification Attack
    • Directory Traversal Attacks
    • Man-in-the-Middle/Sniffing Attack
    • Phishing Attacks
    • Website Defacement
      • Webserver Misconfiguration
    • Webserver Misconfiguration Example
    • HTTP Response Splitting Attack
    • Web Cache Poisoning Attack
    • SSH Bruteforce Attack
    • Webserver Password Cracking
      • Webserver Password Cracking Techniques
    • Web Application Attacks
  • Attack Methodology
    • Webserver Attack Methodology
      • Information Gathering
      • Information Gathering from Robots.txt File
      • Webserver Footprinting
    • Webserver Footprinting Tools
    • Enumerating Webserver Information Using Nmap
    • Webserver Attack Methodology
      • Mirroring a Website
      • Vulnerability Scanning
      • Session Hijacking
      • Hacking Web Passwords
    • Webserver Attack Tools
      • Metasploit
        • Metasploit Architecture
        • Metasploit Exploit Module
        • Metasploit Payload Module
        • Metasploit Auxiliary Module
        • Metasploit NOPS Module
      • Webserver Attack Tools: Wfetch
      • Web Password Cracking Tool: THC-Hydra and Brutus
    • Counter-measures
      • Place Web Servers in Separate Secure Server Security Segment on Network
      • Countermeasures
        • Patches and Updates
        • Protocols
        • Accounts
        • Files and Directories
      • Detecting Web Server Hacking Attempts
      • How to Defend Against Web Server Attacks
      • How to Defend against HTTP Response Splitting and Web Cache Poisoning
      • How to Defend against DNS Hijacking
    • Patch Management
      • Patches and Hotfixes
      • What Is Patch Management?
      • Identifying Appropriate Sources for Updates and Patches
      • Installation of a Patch
      • Implementation and Verification of a Security Patch or Upgrade
      • Patch Management Tool: Microsoft Baseline Security Analyzer (MBSA)
      • Patch Management Tools
    • Webserver  Security Tools
      • Web Application Security Scanner: Syhunt Dynamic and N-Stalker Web Application Security Scanner
      • Web Server Security Scanner: Wikto and Acunetix Web Vulnerability Scanner
      • Web Server Malware Infection Monitoring Tool
        • HackAlert
        • QualysGuard Malware Detection
      • Webserver Security Tools
    • Webserver  Pen Testing
      • Web Server Pen Testing Tool
        • CORE Impact® Pro
        • Immunity CANVAS
        • Arachni



Hacking Web Applications<

  • Web App Concepts
    • Introduction to Web Applications
    • How Web Applications Work?
    • Web Application Architecture
    • Web 2.0 Applications
    • Vulnerability Stack
  • Web App Threats
    • Unvalidated Input
    • Parameter/Form Tampering
    • Directory Traversal
    • Security Misconfiguration
    • Injection Flaws
    • SQL Injection Attacks
      • Command Injection Attacks
    • Command Injection Example
    • File Injection Attack
    • What is LDAP Injection?
      • How LDAP Injection Works?
    • Hidden Field Manipulation Attack
    • Cross-Site Scripting (XSS) Attacks
      • How XSS Attacks Work
      • Cross-Site Scripting Attack Scenario: Attack via Email
      • XSS Example: Attack via Email
      • XSS Example: Stealing Users’ Cookies
      • XSS Example: Sending an Unauthorized Request
      • XSS Attack in Blog Posting
      • XSS Attack in Comment Field
      • Websites Vulnerable to XSS Attack
    • Cross-Site Request Forgery (CSRF) Attack
      • How CSRF Attacks Work?
    • Web Application Denial-of-Service (DoS) Attack
    • Denial of Service (DoS) Examples
    • Buffer Overflow Attacks
    • Cookie/Session Poisoning
      • How Cookie Poisoning Works?
    • Session Fixation Attack
    • CAPTCHA Attacks
    • Insufficient Transport Layer Protection
    • Improper Error Handling
    • Insecure Cryptographic Storage
    • Broken Authentication and Session Management
    • Unvalidated Redirects and Forwards
    • Web Services Architecture
    • Web Services Attack
    • Web Services Footprinting Attack
    • Web Services XML Poisoning
  • Web App Hacking Methodology
    • Footprint Web Infrastructure
      • Server Discovery
      • Service Discovery
      • Server Identification/Banner Grabbing
        • Detecting Web App Firewalls and Proxies on Target Site
      • Hidden Content Discovery
      • Web Spidering Using Burp Suite
      • Web Crawling Using Mozenda Web Agent Builder
    • Attack Web Servers
      • Hacking Web Servers
      • Web Server Hacking Tool: WebInspect
    • Analyze Web Applications
      • Identify Entry Points for User Input
      • Identify Server-Side Technologies
      • Identify Server-Side Functionality
      • Map the Attack Surface
    • Attack Authentication Mechanism
      • Username Enumeration
      • Password Attacks
        • Password Functionality Exploits
        • Password Guessing
        • Brute-forcing
      • Session Attacks: Session ID Prediction/ Brute-forcing
      • Cookie Exploitation: Cookie Poisoning
    • Authorization Attack Schemes
      • Authorization Attack
      • HTTP Request Tampering
      • Authorization Attack: Cookie Parameter  Tampering
    • Attack Session Management Mechanism
      • Session Management Attack
      • Attacking Session Token Generation Mechanism
      • Attacking Session Tokens Handling Mechanism: Session Token Sniffing
    • Perform Injection Attacks
      • Injection Attacks/Input Validation Attacks
    • Attack Data Connectivity
      • Connection String Injection
      • Connection String Parameter Pollution (CSPP) Attacks
      • Connection Pool DoS
    • Attack Web App Client
    • Attack Web Services
      • Web Services Probing Attacks
      • Web Service Attacks
        • SOAP Injection
        • XML Injection
      • Web Services Parsing Attacks
      • Web Service Attack Tool: soapUI and XMLSpy
    • Web Application Hacking Tools
      • Web Application Hacking Tools
        • Burp Suite Professional
        • CookieDigger
        • WebScarab
      • Web Application Hacking Tools
    • Countermeasures
      • Encoding Schemes
      • How to Defend Against SQL Injection Attacks?
      • How to Defend Against Command Injection Flaws?
      • How to Defend Against XSS Attacks?
      • How to Defend Against DoS Attack?
      • How to Defend Against Web Services Attack?
      • Guidelines for Secure CAPTCHA Implementation
      • Web Application Countermeasures
      • How to Defend Against Web Application Attacks?
    • Security Tools
      • Web Application Security Tool
        • Acunetix Web Vulnerability Scanner
        • Watcher Web Security Tool
        • Netsparker
        • N-Stalker Web Application Security Scanner
        • VampireScan
      • Web Application Security Tools
      • Web Application Firewall
        • dotDefender
        • ServerDefender VP
      • Web Application Firewall
    • Web App Pen Testing
      • Web Application Pen Testing
        • Information Gathering
        • Configuration Management Testing
        • Authentication Testing
        • Session Management Testing
        • Authorization Testing
        • Data Validation Testing
        • Denial of Service Testing
        • Web Services Testing
        • AJAX Testing
      • Web Application Pen Testing Framework
        • Kali Linux
        • Metasploit
        • Browser Exploitation Framework (BeEF)
        • PowerSploit



SQL Injection

  • SQL Injection Concepts
    • What is SQL Injection?
    • Why Bother about SQL Injection?
    • How Web Applications Work?
    • SQL Injection and Server-side Technologies
    • Understanding HTTP Post Request
    • Example: Normal SQL Query
    • Understanding an SQL Injection Query
      • Code Analysis
    • Example of a Web App Vulnerable to SQL Injection
      • aspx
      • Attack Analysis
    • Example of SQL Injection
      • Updating Table
      • Adding New Records
      • Identifying the Table Name
      • Deleting a Table
    • Types of SQL Injection
      • Error Based SQL Injection
      • Union SQL Injection
      • Blind SQL Injection
      • No Error Messages Returned
      • Blind SQL Injection: WAITFOR DELAY (YES or NO Response)
      • Boolean Exploitation Technique
    • SQL Injection Methodology
      • Information Gathering and SQL Injection Vulnerability Detection
        • Information Gathering
        • Identifying Data Entry Paths
        • Extracting Information through Error Messages
        • Testing for SQL Injection
        • Additional Methods to Detect SQL Injection
        • SQL Injection Black Box Pen Testing
        • Source Code Review to Detect SQL Injection Vulnerabilities
      • Launch SQL Injection Attacks
        • Perform Union SQL Injection
        • Perform Error Based SQL Injection
        • Perform Error Based SQL Injection: Using Stored Procedure Injection
        • Bypass Website Logins Using SQL Injection
        • Perform Blind SQL Injection – Exploitation (MySQL)
        • Blind SQL Injection
          • Extract Database User
          • Extract Database Name
          • Extract Column Name
          • Extract Data from ROWS
        • Perform Double Blind SQL Injection – Classical Exploitation (MySQL)
          • Perform Blind SQL Injection Using Out of Band Exploitation Technique
        • Exploiting Second-Order SQL Injection
      • Advanced SQL Injection
        • Database, Table, and Column Enumeration
        • Advanced Enumeration
        • Features of Different DBMSs
        • Creating Database Accounts
        • Password Grabbing
        • Grabbing SQL Server Hashes
        • Extracting SQL Hashes (In a Single Statement)
        • Transfer Database to Attacker’s Machine
        • Interacting with the Operating System
        • Interacting with the File System
        • Network Reconnaissance Using SQL Injection
        • Network Reconnaissance Full Query
      • SQL Injection Tools
        • BSQLHacker
        • Marathon Tool
        • SQL Power Injector
        • Havij
        • SQL Injection Tools
        • SQL Injection Tool for Mobile
          • DroidSQLi
          • sqlmapchik
        • Evasion Techniques
          • Evading IDS
          • Types of Signature Evasion Techniques
          • Evasion Technique
            • Sophisticated Matches
            • Hex Encoding
            • Manipulating White Spaces
            • In-line Comment
            • Char Encoding
            • String Concatenation
            • Obfuscated Codes
          • Counter-measures
            • How to Defend Against SQL Injection Attacks?
            • How to Defend Against SQL Injection Attacks: Use Type-Safe SQL Parameters
            • How to Defend Against SQL Injection Attacks
            • SQL Injection Detection Tool
              • dotDefender
              • IBM Security AppScan
              • WebCruiser
            • Snort Rule to Detect SQL Injection Attacks
            • SQL Injection Detection Tools


Hacking Wireless Networks

  • Wireless Concepts
    • Wireless Terminologies
    • Wireless Networks
    • Wi-Fi Networks at Home and Public Places
    • Wireless Technology Statistics
    • Types of Wireless Networks
    • Wireless Standards
    • Service Set Identifier (SSID)
    • Wi-Fi Authentication Modes
    • Wi-Fi Authentication Process Using a Centralized Authentication Server
    • Wi-Fi Chalking
      • Wi-Fi Chalking Symbols
    • Types of Wireless Antenna
      • Parabolic Grid Antenna
    • Wireless Encryption
      • Types of Wireless Encryption
        • WEP Encryption
          • How WEP Works?
        • What is WPA?
          • How WPA Works?
          • Temporal Keys
        • What is WPA2?
          • How WPA2 Works?
        • WEP vs. WPA vs. WPA2
        • WEP Issues
        • Weak Initialization Vectors (IV)
        • How to Break WEP Encryption?
        • How to Break WPA Encryption?
        • How to Defend Against WPA Cracking?
      • Wireless Threats
        • Access Control Attacks
        • Integrity Attacks
        • Confidentiality Attacks
        • Availability Attacks
        • Authentication Attacks
        • Rogue Access Point Attack
        • Client Mis-association
        • Misconfigured Access Point Attack
        • Unauthorized Association
        • Ad Hoc Connection Attack
        • HoneySpot Access Point Attack
        • AP MAC Spoofing
        • Denial-of-Service Attack
        • Jamming Signal Attack
        • Wi-Fi Jamming Devices
      • Wireless Hacking Methodology
        • Wi-Fi Discovery
          • Footprint the Wireless Network
          • Find Wi-Fi Networks to Attack
          • Wi-Fi Discovery Tool
            • inSSIDer and NetSurveyor
            • Vistumbler and NetStumbler
          • Wi-Fi Discovery Tools
          • Mobile-based Wi-Fi Discovery Tool
        • GPS Mapping
          • GPS Mapping Tool
            • WIGLE
            • Skyhook
          • Wi-Fi Hotspot Finder
            • Wi-Fi Finder
            • WeFi
          • How to Discover Wi-Fi Network Using Wardriving?
        • Wireless Traffic Analysis
          • Wireless Cards and Chipsets
          • Wi-Fi USB Dongle: AirPcap
          • Wi-Fi Packet Sniffer
            • Wireshark with AirPcap
            • SteelCentral Packet Analyzer
            • OmniPeek Network Analyzer
            • CommView for Wi-Fi
          • What is Spectrum Analysis?
          • Wi-Fi Packet Sniffers
        • Launch Wireless Attacks
          • Aircrack-ng Suite
          • How to Reveal Hidden SSIDs
            • Fragmentation Attack
          • How to Launch MAC Spoofing Attack?
            • Denial of Service: Deauthentication and Disassociation Attacks
            • Man-in-the-Middle Attack
            • MITM Attack Using Aircrack-ng
            • Wireless ARP Poisoning Attack
            • Rogue Access Point
            • Evil Twin
              • How to Set Up a Fake Hotspot (Evil Twin)?
            • Crack  Wi-Fi Encryption
              • How to Crack WEP Using Aircrack
              • How to Crack WPA-PSK Using Aircrack
              • WPA Cracking Tool: KisMAC
              • WEP Cracking Using Cain & Abel
              • WPA Brute Forcing Using Cain & Abel
              • WPA Cracking Tool: Elcomsoft Wireless Security Auditor
              • WEP/WPA Cracking Tools
              • WEP/WPA Cracking Tool for Mobile: Penetrate Pro
            • Wireless Hacking Tools
              • Wi-Fi Sniffer: Kismet
              • Wardriving Tools
              • RF Monitoring Tools
              • Wi-Fi Traffic Analyzer Tools
              • Wi-Fi Raw Packet Capturing and Spectrum Analyzing Tools
              • Wireless Hacking Tools for Mobile: HackWifi and Backtrack Simulator
            • Bluetooth Hacking
              • Bluetooth Stack
              • Bluetooth Threats
              • How to BlueJack a Victim?
              • Bluetooth Hacking Tool
                • Super Bluetooth Hack
                • PhoneSnoop
                • BlueScanner
              • Bluetooth Hacking Tools
            • Counter-measures
              • How to Defend Against Bluetooth Hacking?
              • How to Detect and Block Rogue AP?
              • Wireless Security Layers
              • How to Defend Against Wireless Attacks?
            • Wireless Security Tools
              • Wireless Intrusion Prevention Systems
              • Wireless IPS Deployment
              • Wi-Fi Security Auditing Tool
                • AirMagnet WiFi Analyzer
                • Motorola’s AirDefense Services Platform (ADSP)
                • Adaptive Wireless IPS
                • Aruba RFProtect
              • Wi-Fi Intrusion Prevention System
              • Wi-Fi Predictive Planning Tools
              • Wi-Fi Vulnerability Scanning Tools
              • Bluetooth Security Tool: Bluetooth Firewall
              • Wi-Fi Security Tools for Mobile: Wifi Protector, WiFiGuard, and Wifi Inspector
            • Wi-Fi Pen Testing
              • Wireless Penetration Testing
              • Wireless Penetration Testing Framework
              • Wi-Fi Pen Testing Framework
              • Pen Testing LEAP Encrypted WLAN
              • Pen Testing WPA/WPA2 Encrypted WLAN
              • Pen Testing WEP Encrypted WLAN
              • Pen Testing Unencrypted WLAN


Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
    • Vulnerable Areas in Mobile Business Environment
    • OWASP Mobile Top 10 Risks
    • Anatomy of a Mobile Attack
    • How a Hacker can Profit from Mobile when Successfully Compromised
    • Mobile Attack Vectors
    • Mobile Platform Vulnerabilities and Risks
    • Security Issues Arising from App Stores
    • App Sandboxing Issues
    • Mobile Spam
    • SMS Phishing Attack (SMiShing) (Targeted Attack Scan)
      • Why SMS Phishing is Effective?
      • SMS Phishing Attack Examples
    • Pairing Mobile Devices on Open Bluetooth and Wi-Fi Connections
  • Hacking Android OS
    • Android OS
    • Android OS Architecture
    • Android Device Administration API
    • Android Vulnerabilities
    • Android Rooting
      • Rooting Android Phones using SuperOneClick
      • Rooting Android Phones Using Superboot
      • Android Rooting Tools
    • Hacking Networks Using Network Spoofer
    • Session Hijacking Using DroidSheep
    • Android-based Sniffer
      • FaceNiff
      • Packet Sniffer, tPacketCapture, and Android PCAP
    • Android Trojan
      • ZitMo (ZeuS-in-the-Mobile)
      • FakeToken and TRAMP.A
      • Fakedefender and Obad
      • FakeInst and OpFake
      • AndroRAT and Dendroid
    • Securing Android Devices
    • Google Apps Device Policy
    • Remote Wipe Service: Remote Wipe
    • Android Security Tool
      • DroidSheep Guard
      • TrustGo Mobile Security and Sophos Mobile Security
      • 360 Security, AVL, and Avira Antivirus Security
    • Android Vulnerability Scanner: X-Ray
    • Android Device Tracking Tools
  • Hacking iOS
    • Apple iOS
    • Jailbreaking iOS
      • Types of Jailbreaking
      • Jailbreaking Techniques
      • App Platform for Jailbroaken Devices: Cydia
      • Jailbreaking Tool: Pangu
      • Untethered Jailbreaking of iOS 7.1.1/7.1.2 Using Pangu for Mac
      • Jailbreaking Tools
        • Redsn0w and Absinthe
        • evasi0n7 and GeekSn0w
        • Sn0wbreeze and PwnageTool
        • LimeRa1n and Blackra1n
      • Guidelines for Securing iOS Devices
      • iOS Device Tracking Tools
    • Hacking Windows Phone OS
      • Windows Phone 8 Architecture
      • Secure Boot Process
      • Guidelines for Securing Windows OS Devices
      • Windows OS Device Tracking Tool: FollowMee GPS Tracker
    • Hacking BlackBerry
      • BlackBerry Operating System
      • BlackBerry Enterprise Solution Architecture
      • Blackberry Attack Vectors
        • Malicious Code Signing
        • JAD File Exploits and Memory/ Processes Manipulations
        • Short Message Service (SMS) Exploits
        • Email Exploits
        • PIM Data Attacks and TCP/IP Connections Vulnerabilities
      • Guidelines for Securing BlackBerry Devices
      • BlackBerry Device Tracking Tools: MobileTracker and Position Logic Blackberry Tracker
      • Mobile Spyware: mSpy and StealthGenie
      • Mobile Spyware
    • Mobile Device Management (MDM)
      • MDM Solution: MaaS360 Mobile Device Management (MDM)
      • MDM Solutions
      • Bring Your Own Device (BYOD)
        • BYOD Risks
        • BYOD Policy Implementation
        • BYOD Security Guidelines for Administrator
        • BYOD Security Guidelines for Employee
      • Mobile Security Guidelines and Tools
        • General Guidelines for Mobile Platform Security
        • Mobile Device Security Guidelines for Administrator
        • SMS Phishing Countermeasures
        • Mobile Protection Tool
          • BullGuard Mobile Security
          • Lookout
          • WISeID
          • zIPS
        • Mobile Protection Tools
        • Mobile Anti-Spyware
      • Mobile Pen Testing
        • Android Phone Pen Testing
        • iPhone Pen Testing
        • Windows Phone Pen Testing
        • BlackBerry Pen Testing
        • Mobile Pen Testing Toolkit
          • zANTI
          • dSploit
          • Hackode (The Hacker’s Toolbox)


Evading IDS, Firewalls, and Honeypots

  • IDS, Firewall and Honeypot Concepts
    • Intrusion Detection Systems (IDS) and their Placement
      • How IDS Works?
      • Ways to Detect an Intrusion
      • General Indications of Intrusions
      • General Indications of System Intrusions
      • Types of Intrusion Detection Systems
      • System Integrity Verifiers (SIV)
    • Firewall
      • Firewall Architecture
      • DeMilitarized Zone (DMZ)
      • Types of Firewall
        • Packet Filtering Firewall
        • Circuit-Level Gateway Firewall
        • Application-Level Firewall
        • Stateful Multilayer Inspection Firewall
      • Honeypot
        • Types of Honeypots
      • IDS, Firewall and Honeypot System
        • Intrusion Detection Tool: Snort
        • Snort Rules
          • Rule Actions and IP Protocols
          • The Direction Operator and IP Addresses
          • Port Numbers
        • Intrusion Detection Systems: Tipping Point
        • Intrusion Detection Tools
        • Intrusion Detection Tools for Mobile
          • Firewall
          • ZoneAlarm PRO Firewall 2015
          • Comodo Firewall
        • Firewalls
        • Firewalls for Mobile: Android Firewall and Firewall iP
        • Firewalls for Mobile
        • Honeypot Tool: KFSensor and SPECTER
        • Honeypot Tools
        • Honeypot Tool for Mobile: HosTaGe
      • Evading IDS
        • Insertion Attack
        • Evasion
        • Denial-of-Service Attack (DoS)
        • Obfuscating
        • False Positive Generation
        • Session Splicing
        • Unicode Evasion Technique
        • Fragmentation Attack
          • Overlapping Fragments
        • Time-To-Live Attacks
        • Invalid RST Packets
        • Urgency Flag
        • Polymorphic Shellcode
        • ASCII Shellcode
        • Application-Layer Attacks
        • Desynchronization – Pre Connection SYN
        • Desynchronization – Post Connection SYN
        • Other Types of Evasion
      • Evading Firewalls
        • Firewall Identification
          • Port Scanning
          • Firewalking
          • Banner Grabbing
        • IP Address Spoofing
        • Source Routing
        • Tiny Fragments
        • Bypass Blocked Sites Using IP Address in Place of URL
        • Bypass Blocked Sites Using Anonymous Website Surfing Sites
        • Bypass a Firewall Using Proxy Server
        • Bypassing Firewall through ICMP Tunneling Method
        • Bypassing Firewall through ACK Tunneling Method
        • Bypassing Firewall through HTTP Tunneling Method
        • Why do I Need HTTP Tunneling
        • HTTP Tunneling Tools
          • HTTPort and HTTHost
          • Super Network Tunnel
          • HTTP-Tunnel
        • Bypassing Firewall through SSH Tunneling Method
        • SSH Tunneling Tool: Bitvise
        • Bypassing Firewall through External Systems
        • Bypassing Firewall through MITM Attack
        • Bypassing Firewall through Content
      • IDS/Firewall Evading Tools
        • IDS/Firewall Evasion Tool
          • Traffic IQ Professional
          • tcp-over-dns
        • IDS/Firewall Evasion Tools
        • Packet Fragment Generator: Colasoft Packet Builder
        • Packet Fragment Generators
      • Detecting Honeypots
        • Detecting Honeypots
        • Honeypot Detecting Tool: Send-Safe Honeypot Hunter
      • IDS/Firewall Evasion Counter-measures
        • Countermeasures
      • Penetration Testing
        • Firewall/IDS Penetration Testing
        • Firewall Penetration Testing
        • IDS Penetration Testing


Cloud Computing

  • Introduction to Cloud Computing
    • Types of Cloud Computing Services
    • Separation of Responsibilities in Cloud
    • Cloud Deployment Models
    • NIST Cloud Computing Reference Architecture
    • Cloud Computing Benefits
    • Understanding Virtualization
    • Benefits of Virtualization in Cloud
  • Cloud Computing Threats
  • Cloud Computing Attacks
    • Service Hijacking using Social Engineering Attacks
    • Service Hijacking using Network Sniffing
    • Session Hijacking using XSS Attack
    • Session Hijacking using  Session Riding
    • Domain Name System (DNS) Attacks
    • Side Channel Attacks or Cross-guest VM Breaches
      • Side Channel Attack Countermeasures
    • SQL Injection Attacks
    • Cryptanalysis Attacks
      • Cryptanalysis Attack Countermeasures
    • Wrapping Attack
    • Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
  • Cloud Security
    • Cloud Security Control Layers
    • Cloud Security is the Responsibility of both Cloud Provider and Consumer
    • Cloud Computing Security Considerations
    • Placement of Security Controls in the Cloud
    • Best Practices for Securing Cloud
    • NIST Recommendations for Cloud Security
    • Organization/Provider Cloud Security Compliance Checklist
  • Cloud Security Tools
    • Core CloudInspect
    • CloudPassage Halo
    • Cloud Security Tools
  • Cloud Penetration Testing
    • What is Cloud Pen Testing?
    • Key Considerations for Pen Testing in the Cloud
    • Scope of Cloud Pen Testing
    • Cloud Penetration Testing
    • Recommendations for Cloud Testing




  • Market Survey 2014: The Year of Encryption
  • Case Study: Heartbleed
  • Case Study: Poodlebleed
  • Cryptography Concepts
    • Cryptography
    • Types of Cryptography
    • Government Access to Keys (GAK)
  • Encryption Algorithms
    • Ciphers
    • Data Encryption Standard (DES)
    • Advanced Encryption Standard (AES)
    • RC4, RC5, RC6 Algorithms
    • The DSA and Related Signature Schemes
    • RSA (Rivest Shamir Adleman)
      • The RSA Signature Scheme
      • Example of RSA Algorithm
    • Message Digest (One-way Hash) Functions
      • Message Digest Function: MD5
    • Secure Hashing Algorithm (SHA)
    • What is SSH (Secure Shell)?
  • Cryptography Tools
    • MD5 Hash Calculators: HashCalc, MD5 Calculator and HashMyFiles
    • Hash Calculators for Mobile: MD5 Hash Calculator, Hash Droid, and Hash Calculator
    • Cryptography Tool
      • Advanced Encryption Package 2014
      • BCTextEncoder
    • Cryptography Tools
    • Cryptography Tools for Mobile: Secret Space Encryptor, CryptoSymm, and Cipher Sender
  • Public Key Infrastructure(PKI)
    • Certification Authorities
    • Signed Certificate (CA) Vs. Self Signed Certificate
  • Email Encryption
    • Digital Signature
    • SSL (Secure Sockets Layer)
    • Transport Layer Security (TLS)
    • Cryptography Toolkit
      • OpenSSL
      • Keyczar
    • Pretty Good Privacy (PGP)
  • Disk Encryption
    • Disk Encryption Tools: Symantec Drive Encryption and GiliSoft Full Disk Encryption
    • Disk Encryption Tools
  • Cryptography Attacks
    • Code Breaking Methodologies
    • Brute-Force Attack
    • Meet-in-the-Middle Attack on Digital Signature Schemes
    • Side Channel Attack
      • Side Channel Attack – Scenario
    • Cryptanalysis Tools
      • Cryptanalysis Tool: CrypTool
      • Cryptanalysis Tools
      • Online MD5 Decryption Tool

3. Certified Information Security Systems Professional (CISSP)

Enquire For Price & Details

CISSP Course Overview

New Horizons CISSP Training is the most comprehensive review of information security concepts and industry best practices, and covers the 10 domains of the CISSP CBK (Common Body of Knowledge).

This training course will help candidates review and refresh their information security knowledge and help identify areas they need to study for the CISSP exam.

Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions.

This interactive learning technique is based on sound adult learning theories.

Who Should Attend?

The course is intended for students who have at least four years of recent full-time security professional work experience in two or more of the ten domains of the (ISC)² Certified Information System Security Professional (CISSP) Common Body of Knowledge (CBK), including experience with the architecture, design, management, risk, and controls that assure the security of business environments. The course builds on and brings together the holistic view of the topics covered in the everyday environment of an information systems security professional. Professional experience including the following will greatly enhance the learning environment.

  • Work requiring special education or intellectual attainment, usually including a liberal education or college degree
  • Work requiring habitual memory of a body of knowledge shared by others doing similar work
  • Management/supervision of projects and/or employees
  • Work requiring the exercise of judgment, management decision-making, and discretion
  • Work requiring the exercise of ethical judgment (as opposed to ethical behavior)
  • Professional writing and oral communication (e.g., presentation)
  • Research and development
  • The specification and selection of controls and mechanisms
  • Applicable job title examples include: CISO, director, manager, supervisor, analyst, cryptographer, cyber architect, information assurance engineer, instructor, professor, lecturer, investigator, computer scientist, program manager, and lead

Course Objectives

After completing this workshop, participants will be able to:

  • Identify key purposes, benefits, and processes of information classification and how it is used to determine access control policies and identify the process for assessing the effectiveness of implemented controls
  • Understand the bascis of telecommunication and network security concepts, required components for minimizing security risks, securing channels of communication, and techniques for preventing and detecting network-based attacks
  • Define and apply information security governance and Risk Management Framework including the policies, concepts, principles, structures and standards that are established for the protection of information assets and how to assess the effectiveness of that protection
  • Explain the details of software development security, including the activities and processes pertaining to the planning, programming, and management of software and systems that manage software, including ways to secure applications through design and control interfaces and assess the usefulness of their application security.
  • Identify the concepts within cryptography, including the terms and application of public and private algorithms, distribution management, methods of attack, and the application, development, and use of digital signatures for authenticity, electronic transactions, and nonrepudiation processes
  • Identify security architecture and design concepts, focusing on the architecture of security systems that provide for the availability, integrity, and confidentiality of organizational assets as well as the concepts, principles, structures, frameworks, and standards used in the design and implementation of security requirements of individual components and enterprise-wide systems
  • Identify the key terms and processes of security operations and how to protect and control information processing assets in a centralized or distributed environment
  • Identify and apply the business continuity and disaster recovery planning requirements necessary to ensure the preservation of the business in case of major disruptions to normal business operations, including the project scope, planning and how to conduct a business impact analysis, identify recovery strategies, develop the recovery plan, and implement it
  • Define and explain the legal, regulations, investigations, and compliance concepts of internationally accepted methods, processes, and procedures used in computer crime legislation; regulations specific to the investigative measures and techniques used to identify the occurrence of an incidence; and the gathering, analysis, and management of evidence
  • Define and apply the requirements necessary for the overall physical (environmental) security processes for the evaluation of physical, environmental, and procedural risks that might be present in a facility, organization, or structure where information systems are stored and managed

Course Outline

  1. Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business Continuity) 
  • Confidentiality, integrity, and availability concepts
  • Security governance principles
  • Compliance
  • Legal and regulatory issues
  • Professional ethics
  • Security policies, standards, procedures and guidelines
  • Business continuity requirements
  • Personnel security policies
  • Risk management concepts
  • Threat modeling
  • Risk considerations
  • Security education, training, and awareness


  1. Asset Security (Protecting Security of Assets)
  • Information and asset classification
  • Ownership (e.g. data owners, system owners)
  • Protect privacy
  • Appropriate retention
  • Data security controls
  • Handling requirements (e.g. markings, labels, storage)


  1. Security Engineering (Engineering and Management of Security)
  • Engineering processes using secure design principles
  • Security models fundamental concepts
  • Security evaluation models
  • Security capabilities of information systems
  • Security architectures, designs, and solution elements vulnerabilities
  • Web-based systems vulnerabilities
  • Mobile systems vulnerabilities
  • Embedded devices and cyber-physical systems vulnerabilities
  • Cryptography
  • Site and facility design secure principles
  • Physical security


  1. Communication and Network Security (Designing and Protecting Network Security)
  • Secure network architecture design (e.g. IP & non-IP protocols, segmentation)
  • Secure network components
  • Secure communication channels
  • Network attacks


  1. Identity and Access Management (Controlling Access and Managing Identity)
  • Physical and logical assets control
  • Identification and authentication of people and devices
  • Identity as a service (e.g. cloud identity)
  • Third-party identity services (e.g. on-premise)
  • Access control attacks
  • Identity and access provisioning lifecycle (e.g. provisioning review)


  1. Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
  • Assessment and test strategies
  • Security process data (e.g. management and operational controls)
  • Security control testing
  • Test outputs (e.g. automated, manual)
  • Security architectures vulnerabilities


  1. Security Operations (Foundational Concepts, Investigations, Incident Management, and Disaster Recovery)
  • Investigations support and requirements
  • Logging and monitoring activities
  • Provisioning of resources
  • Foundational security operations concepts
  • Resource protection techniques
  • Incident management
  • Preventative measures
  • Patch and vulnerability management
  • Change management processes
  • Recovery strategies
  • Disaster recovery processes and plans
  • Business continuity planning and exercises
  • Physical security
  • Personnel safety concerns


  1. Software Development Security (Understanding, Applying, and Enforcing Software Security)
  • Security in the software development lifecycle
  • Development environment security controls
  • Software security effectiveness
  • Acquired software security impact

4. EC Council Security Analyst (ECSA) v9 Training

Enquire For Price & Details

What is the EC-Council Security Analyst program?

You are an ethical hacker. In fact, you are a Certi­ed Ethical Hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep. You have su-cient knowledge and an arsenal of hacking tools and you are also pro­cient in writing custom hacking code.

Is that enough?

Can you become an industry accepted security professional? Will organizations hire you to help them protect their systems? Do you have any knowledge in applying a suitable methodology to conduct a penetration test for an enterprise client? Do you have any experience writing a custom penetration testing report?

More importantly, do you have a globally recognized certification that can verify your penetration testing capabilities?

If you are the person above, what you may be lacking is the knowledge and experience to execute a successful penetration test according to accepted industry standards.

The ECSA is a security credential like no other! The ECSA course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

The ECSA program takes the tools and techniques you learned in the Certi­fied Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in CEH by utilizing EC-Council’s published penetration testing methodologies.

It is a highly interactive, comprehensive, standards-based and methodology intensive 5-day security training program 5-day which teaches information security professionals to conduct real life penetration tests.

This course is part of the Information Security Track of EC-Council. This is a “Professional” level course, with the Certi­fied Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master” level certification.

The Cyber Range iLabs

As the ECSA course is a fully hands-on program, the exercises cover real world scenario. By practicing the skills that are provided to you in the ECSA class, we are able to bring you up to speed with the latest threats that organizations may be vulnerable to.

This can be achieved with the EC-Council Cyber Range iLabs. It allows you to dynamically access a host of Virtual Machines precon­gured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection.

Our web portal enables you to launch an entire range of target machines and access them remotely with one simple click. It is the most cost e-ective and easy to use live range lab solution available.

With iLabs, lab exercises can be accessed 24×7, allowing the student to practice skills in a safe and fully functional network anytime it is convenient.

Our guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials as well as our state-of-the-art “Open Environment” allowing you to launch a complete live range open for any form of hacking or testing.

Available target machines are completely virtualized, allowing you to control and reset machines quickly and easily with no required instructor or administrative interaction.

Skills Based Competency

The ECSAV9 penetration testing course is designed to enhance the skills based competency of a penetration tester. This course is intensively hands-on and a tremendous amount of emphasis is placed on the practical competency of the student.

Unlike the previous version of ECSA exam, in the new ECSAv9, a student will only be allowed to challenge the ECSA exam after meeting certain eligibility requirements.

To become eligible, a student must conduct a detailed penetration test through the EC-Council Cyber Range iLabs environment and submit a written report via EC-Council’s ASPEN system.

Only candidates that successfully complete the penetration test in the Cyber Range iLabs environment are allowed to challenge the ECSA exam.

You will conduct a penetration test on a company that has various departments, subnets and servers, and multiple operating systems with defense mechanisms architecture that has both militarized and non-militarized zones.

The design of the course is such that the instructor in the class will actually take you through the core concepts of conducting a penetration test based on EC-Council’s published penetration testing methdology and guide you through the report writing process for this organization.

Who Should Attend

  • Ethical Hackers
  • Penetration Testers
  • Network Server Administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators
  • Risk Assessment Professionals.


5 days (9:00 – 5:00)

Certi­fication Exam

The ECSA exam aims to test a candidate’s knowledge and application of critical penetration testing methodologies.

To be eligible to attempt the exam, candidates are required to perform real-world penetration testing over EC-Council’s secure cyber range and to produce a penetration test report that clearly documents the vulnerabilities found. This report will be graded by our professionals.

Candidates that successfully submit an acceptable report will proceed on to a multiple-choice exam that tests a candidate’s knowledge. Candidates that successfully pass the multiple-choice exam will be awarded the ECSA credential.

Your Toggle Title

Your Content

ECSA v9 Exam Information

Candidates that submit reports to the required standards will be provided with exam vouchers for the multiple-choice ECSA v9 exam. Multiple-choice exams are proctored online through the EC-Council Exam portal:

  • Credit Towards Certi­cation: ECSA v9
  • Number of Questions:150
  • Passing Score: 70%
  • Test Duration: 4 hours

The ECSA Assessment

The course comprises of 2 sets of lab challenges . Both are on the EC- Council ilabs Cyber Range. The ­rst set covers practise labs for each module. In all, there are 45 such labs in total. The other is a Challenge Scenario which mimics an actual penetration test in an imaginary ­nancial service company. As a pre-requisite, you will be required to actually complete a penetration testing activity and submit a report to EC-Council before you will be allowed to attempt the ECSA V9 Exam.

The Challenge Scenario
Brian works as a personal loan manager at FNB Financial Services which is a large multinational consulting corporation, headquartered in Atlanta, U.S.A. FNB specializes in personal, home equity, and debt consolidation loans around the world. Brian has been a trusted foot soldier for his organization for over a decade and is reeled in to handle only high-pro­le cases. Since Brian mostly telecommutes with his overseas clientele, he relies heavily on the network infrastructure of his organization.

Infrastructure Available to Brian
Like any large organization, FNB’s internal network consists of several subnets housing various organizational units. The front o-ce is connected to a separate subnet which connects to the company’s public-facing computers. The company has installed various kiosks to help customers understand their product and services. The front o-ce also has a Wi-Fi connectivity to cater users who carry their own smartphones and laptops.

The FNB’s internal network is made up of Militarized and Demilitarized Zones connected with a huge pool of database servers in Database Zone. As a security precaution, and by design, all the internal resource zones are con­gured with dierent subnet IPs. The militarized zone houses the application servers that provide application frameworks for various departments of the organization.

The Demilitarized Zone contains public facing systems of the organization such as web and mail servers.

FNB headquarters’ network topology and protocols are replicated around the world in all its satellite o­ces for easy communication with the headquarters.

Brian’s Predicament
Brian is all set to present a loan consolidation plan to one of his biggest client from Japan. Mr. Takamashi, client’s representative, has agreed for a video conference to go over and discuss Brian’s proposal. Half an hour before the call, Brian switches on his laptop which is connected to the company’s Wi-Fi and LAN, to make last minute tweaks in his proposal. To his horror he -nds all his -les gone. The hard drive of his laptop had been wiped clean with just one -le sitting in there titled, “Gothcha!”

Brian obviously had to postpone his call with the client which he knew did not go down well. He called the network admin of FNB to take a look at his computer. To his surprise the network admin informed him that this was something that employees of FNB were facing throughout the world.

Computers of FNB employees around the world were systematically being victimized by rampant hacking. The hacking was not only widespread, but was being executed so awlessly that the attackers, after compromising a system, stole everything of value and completely erased their tracks within 20 minutes.

Brian immediately brought this to the notice of the top management. Understandably they were concerned about their network and the reputation of their organization. The sheer volume of systems hacked was an alarming revelation for them.

The management has decided to seek the service of a penetration tester or security auditor to audit their networks for security vulnerabilities in order to avoid future attacks.

FNB has identi-ed you as a third-party penetration tester to perform the pen testing of their information infrastructure. Your challenge is to perform a thorough pen test so that people like Brian don’t have to cancel their business calls in future.

Course Outline

 Core Modules

  1. Security Analysis and Penetration Testing Methodologies
  2. TCP IP Packet Analysis
  3. Pre-penetration Testing Steps
  4. Information Gathering Methodology
  5. Vulnerability Analysis
  6. External Network Penetration Testing Methodology
  7. Internal Network Penetration Testing Methodology
  8. Firewall Penetration Testing Methodology
  9. IDS Penetration Testing Methodology
  10. Web Application Penetration Testing Methodology
  11. SQL Penetration Testing Methodology
  12. Database Penetration Testing Methodology
  13. Wireless Network Penetration Testing Methodology
  14. Mobile Devices Penetration Testing Methodology
  15. Cloud Penetration Testing Methodology
  16. Report Writing and Post Test Actions

Self-Study Modules

  1. Password Cracking Penetration Testing
  2. Router and Switches Penetration Testing
  3. Denial-of-Service Penetration Testing
  4. Stolen Laptop, PDAs and Cell Phones Penetration Testing
  5. Source Code Penetration Testing
  6. Physical Security Penetration Testing
  7. Surveillance Camera Penetration Testing
  8. VoIP Penetration Testing
  9. VPN Penetration Testing
  10. Virtual Machine Penetration Testing
  11. War Dialing
  12. Virus and Trojan Detection
  13. Log Management Penetration Testing
  14. File Integrity Checking
  15. Telecommunication and Broadband Communication
  16. Email Security Penetration Testing
  17. Security Patches Penetration Testing
  18. Data Leakage Penetration Testing
  19. SAP Penetration Testing
  20. Standards and Compliance
  21. Information System Security Principles
  22. Information System Incident Handling and Response
  23. Information System Auditing and Certification

Note: Self-study modules are available in ASPEN portal

5. EC-Council Certified Secure Programmer-.NET

Enquire For Price & Details

Course Description

Software defects, bugs, and flaws in the logic of the program are consistently the cause for software vulnerabilities. Analysis by software security professionals has proven that most vulnerabilities are due to errors in programming. Hence, it has become a must for organizations to educate their software developers about secure coding practices.

Attackers try to find security vulnerabilities in the applications or servers and then try to use these vulnerabilities to steal secrets, corrupt programs and data, and gain control of computer systems and networks. Sound programming techniques and best practices can be used to develop high quality code to prevent web application attacks. Secure programming is a defensive measure against attacks targeted towards application systems.

This course will be invaluable to software developers and programmers alike to code and develop highly secure applications and web applications. This is done throughout the software life cycle that involves designing, implementing, and deployment of applications.

.Net is widely used by almost all organizations as the leading framework to build web applications. The course teaches developers how to identify security flaws and implement security countermeasures throughout the software development life cycle to improve the overall quality of products and applications.

EC-Council Certified Secure Programmer lays the foundation required by all application developers and development organizations to produce applications with greater stability and fewer security risks to the consumer. The Certified Secure Application Developer standardizes the knowledge base for application development by incorporating the best practices followed by experienced experts in the various domains.

This course is purposefully built with tons of labs peppered throughout the three days of training, offering participants critical hands on time to fully grasp the new techniques and strategies in secure programming.

Course Objectives

This course will:

  • Familiarize you with .Net Application Security, ASP.Net Security Architecture and help you understand the need for application security and common security threats to .Net framework
  • Discuss security attacks on .Net frame work and explain the secure software development life cycle
  • Help you to understand common threats to .Net assemblies and familiarize you with stack walking processes
  • Discuss the need for input validation, various input validation approaches, common input validation attacks, validation control vulnerabilities, and best practices for input validation
  • Familiarize you with authorization and authentication processes and common threats to authorization and authentication
  • Discuss various security principles for session management tokens, common threats to session management, ASP.Net session management techniques, and various session attacks
  • Cover the importance of cryptography in .Net, different types of cryptographic attacks in .Net, and various .Net cryptography namespaces
  • Explain symmetric and asymmetric encryption, hashing concepts, digital certificates, digital and XML signatures
  • Describe the principles of secure error handling, different levels of exception handling, and various .Net logging tools
  • Examine file handling concepts, file handling security concerns, path traversal attacks on file handling, and defensive techniques against path traversal attack

What You Will Learn

Students in this course will acquire knowledge in the following areas:

  • .Net framework security features and various secure coding principles
  • .Net framework run time security model, role-based security, code access security (CAS), and class libraries security
  • Various validation controls, mitigation techniques for validation control vulnerabilities, defensive techniques for SQL injection attacks, and output encoding to prevent input validation attacks
  • Defensive techniques against session attacks, cookie security, and View State security
  • Mitigating vulnerabilities in class level exception handling, managing unhandled errors, and implementing windows log security against various attacks
  • Defensive techniques against path traversal attacks and defensive techniques against canonicalization attack and file ACLs
  • Mitigating vulnerabilities in machine config files, mitigating the vulnerabilities in app config files, and security code review approaches
  • The importance of secure programmers and certified secure programmers, the career path of secure programmers, and the essential skill set of secure programmers.

ECSP Course Outline

  • You must be well-versed with .NET programming language.
  • The ECSP certification is intended for programmers who are responsible for designing and building secure Windows/Web based applications with .NET Framework. It is designed for developers who have .NET development skills.
  • Number of Questions: 50
  • Passing Score: 70%
  • Test Duration: 2 Hours
  • Test Format: Multiple Choice
  • Test Delivery: EC-Council Exam Centre
  • Exam Prefix: 312-93


Course Outline

Module 01: Introduction t.NET Application Security

  • Microsoft .NET Application Security
    • NET Application Security
    • Need for .NET Application Security
    • .NET Application Attack Statistics
    • Understanding Application Security
    • End-to-End Security
    • What is Secure Coding?
    • Why are Security Mistakes Made?
    • Key Elements of .NET Framework Architecture Security
    • .NET Security Features
    • .NET Framework Security Namespaces
    • ASP.NET Security Architecture
  • Common Security Threats on .NET
    • Web Application Security Frame
    • Common Security Threats on .NET
    • OWASP Top 10 Attacks on .NET
  • Security Misconfiguration
  • Cross-Site Scripting (XSS) Attacks
  • SQL Injection Attacks
  • Cross-Site Request Forgery (CSRF) Attack
  • Failure tRestrict URL Access
  • Insufficient Transport Layer Protection
  • Unvalidated Redirects and Forwards
  • Insecure Direct Object References
  • Broken Authentication and Session Management
  • Insecure Cryptographic Storage
  • Secure Development Lifecycle (SDL)
    • Phases of SDL
    • SDL Process
    • Integrating Security intthe Development Lifecycle
    • Security in the Design Stage: Threat Modeling
    • Threat Modeling Process
  • The STRIDE model
  • The DREAD model
  • Guidelines for Applying Security in Implementation Phase of SDL
  • Security Testing
  • Secure Coding Principles
  • Guidelines for Developing Secure Codes

Module 02: .NET Framework Security

  • Introduction t.NET Framework
    • .NET Framework Architecture
    • Basic Components of .NET Framework
  • .Net Runtime Security
    • .NET Framework Runtime Security Model
    • Role-Based Security
  • Role-Based Security: Windows Principal
  • Role-Based Security: Generic Principal
    • Code Access Security (CAS)
  • Using Code Access Security in ANET
  • Evidence-Based Security
  • Permissions
  • Code Access Permissions
  • Identity Permissions
  • Role-Based Security Permissions
  • Permissions Classes in .NET
  • Type Safety
  • SkipVerification
  • Stack Walk
  • Declarative and Imperative Security Syntax
    • Isolated Storage
  • Data Storing Process in Isolated Storage
  • Managing Data Isolation using Store’s Identity
  • Levels of Isolation
  • Limitations of Isolated Storage
  • Administering Isolated Storage
  • Granting Isolated Storage Permissions with Mscorcfg.msc
  • Granting Isolated Storage Permissions with Caexe
  • Managing Existing Stores
  • .NET Class Libraries Security
    • Class Libraries Security
    • Writing Secure Class Libraries
  • Security Demands
  • Link Demands
  • Security Holes in Link Demands
  • Inheritance Demands
  • Overriding Security Checks
  • Security Optimizations
  • .NET Assembly Security
  • .NET Assembly
    • Common Threats NET Assemblies
    • Privileged Code
    • Secure Assembly Design Considerations
    • Secure Class Design Considerations
    • Securing Assemblies Using Strong Name Signing
    • Securing Assemblies with Code Access Attributes
    • Securing Assemblies Against Decompilation Using Obfuscation
    • Dotfuscator: .NET Obfuscator
    • Protecting Assemblies Using Publisher Certificate
    • Securing Assemblies Using Application Domain Permissions
    • Vulnerability in Serializing Sensitive Objects
    • Vulnerabilities in Multithreaded Assemblies
    • Vulnerabilities in Static Class Methods/ Constructors of Assemblies
    • Vulnerability in Dispose Methods
  • .NET Security Tools
    • Code Access Security Policy Tool: Caspol.exe
  • Caspol.exe Parameters
    • Software Publisher Certificate Test Tool: Cert2spc.exe
    • Certificate Manager Tool: Certmgr.exe
  • Options in Certmgr.exe
    • Certificate Creation Tool: Makecert.exe
  • Options in Makecerexe
    • PEVerify Tool: Peverify.exe
  • Options in Peverify.exe
    • .NET Security Annotator Tool: SecAnnotate.exe
    • Sign Tool: SignTool.exe
    • Strong Name Tool: Sn.exe
    • Isolated Storage Tool: Storexe
  • Best Practices for .NET Framework Security

Module 03: Input Validation and Output Encoding

  • Input Validation
    • Why Input Validation?
    • Input Validation
    • Input Validation Specification
    • Input Validation Approaches
  • Client-side Input Validation
  • Server-side Input Validation
  • Client-Server Input Validation Reliability
    • Input Filtering
  • Input Filtering Technique: Black Listing
  • Input Filtering Technique: White Listing
    • Perform Input Validation and Filtering using a Regular Expression
    • String Manipulation and Comparison
    • Data Type Conversion
    • ASP.NET Validation Controls
  • Set of ASP.NET Validation Controls
  • RequiredField Validation Control
  • Range Validation Control
  • Comparison Validation Control
  • RegularExpression Validation Control
  • Custom Validation Control
  • Validation Summary Control
  • Input Validation Attacks
    • Cross Site Scripting (XSS) Attack
    • SQL Injection Attacks
    • HTML Tags Used in XSS Attack
  • Defensive Techniques against XSS Attacks
    • XSS Attack Defensive Techniques
    • Need for Securing Validation Controls
    • Securing RequiredField Validation Control
    • Securing Range Validation Control
    • Specifying the Correct Data Type in Range Validator
    • Securing Comparison Validation Control
    • Securing RegularExpression Validation Control
    • Securing Custom Validation Control
    • Integrating Security for Multiple Validation Controls
  • Defensive Techniques against SQL Injection Attacks
    • SQL Injection Attack Defensive Techniques
    • Using Parameterized Queries
    • Using Parameterized Stored Procedures
    • Using Escape Routines tHandle Special Input Characters
    • Database Specific Escaping: Oracle Escaping
    • Using a Least-Privileged Database Account
    • Constraining Input
  • Output Encoding
    • ASP.NET Controls with Encoding Support
    • Encoding Unsafe Output using HtmlEncode
    • Encoding Unsafe Output using UrlEncode
    • Anti-XSS Library
    • Encoding Output using Anti-XSS Library
  • Sandboxing
    • Sandboxing Software: Sandboxie
    • Sandboxing Software: BufferZone Pro
    • Sandboxing API in .NET Framework
    • Creating Sandbox for Partial Trust Code
  • Best Practices
    • Microsoft Code Analysis Tool .NET (CAT.NET)

Module 04: .NET Authorization and Authentication

  • Introduction tAuthentication and Authorization
    • Common Threats with User Authentication and Authorization
    • Authentication and Authorization in .NET Web Application Security
    • Security Relationship between IIS and ASP.NET
  • Authentication
    • ASP.NET Authentication
    • ASP.NET Authentication Modes
    • Security Settings Matrix between IIS and ASP.NET
    • Forms Authentication
    • Passport Authentication
  • Implementing Passport Authentication
    • Custom Authentication
  • Implementing Custom Authentication Scheme
    • Windows Authentication
    • Selecting an Appropriate Authentication Method
    • Determining an Authentication Method
    • Enterprise Services Authentication
    • SQL Server Authentication
  • Authorization
    • Identities, Principals, and Roles
    • ASP.NET Authorization
    • URL Authorization
    • File Authorization
  • What is Impersonation?
    • Impersonation Options
    • Delegation
  • Code-based Authorization
  • Declarative Authorization
  • Imperative Authorization
  • Explicit Authorization
    • Authorization using ASP.NET Roles
    • Enterprise Services Authorization
    • SQL Server Authorization
  • Authentication and Authorization Vulnerabilities
    • Securing Forms Authentication Tickets Securing Hash Generation using SHA1 Securing Encryption using AES
    • Securing Forms Authentication Cookies using SSL
    • Securing Forms Authentication Credentials
    • Preventing Session Hijacking using Cookieless Authentication
    • Securing Authentication Token Using Sliding Expiration
    • Avoiding Forms Authentication Cookies from Persisting Using DisplayRememberMe Property
    • Avoiding Forms Authentication Cookies from Persisting Using RedirectFromLoginPage
    • Method
    • Avoiding Form Authentication Cookies from Persisting Using SetAuthCookie Method
    • Avoiding Form Authentication Cookies from Persisting Using GetRedirectUrl Method
    • Avoiding Form Authentication Cookies from Persisting Using FormsAuthenticationTicket
    • Constructor
    • Securing Passwords with minRequiredPasswordLength
    • Securing Passwords with minRequiredNonalphanumericCharacters
    • Securing Passwords with passwordStrengthRegularExpression
    • Restricting Number of Failed Logon Attempts
    • Securing Application by Using Absolute URLs for Navigation
    • Securing Applications from Authorization Bypass Attacks
    • Creating Separate Folder for Secure Pages in Application
    • Validating Passwords on CreateUserWizard Control using Regular Expressions
  • Authentication and Authorization Best Practices
    • Application Categories Considerations: Authentication-Forms
    • Application Categories Considerations: Authorization
    • Guidelines for Secure Authentication and Authorization Coding
    • Secure Development Checklists: Authentication
    • Secure Development Checklists: Authorization
    • Secure Development Checklists: User-Server Authentication
  • Secure Communication
    • Storing Secrets
    • Options for Storing Secrets in ASP.NET

Module 05: Secure Session and State Management

  • Session Management
    • Basic Security Principles for Session Management Tokens
    • Common Threats tSession Management
  • Session Management Techniques in ASP.NET
    • ASP.NET Session Management Techniques
    • Client-Side State Management
  • Client-Side State Management Using Cookies
  • Client-Side State Management Using Hidden Fields
  • Client-Side State Management Using View State
  • Client-Side State Management Using Control State
  • Client-Side State Management Using Query Strings
    • Server-Side State Management
  • Server-Side State Management Using Application Object
  • Server-Side State Management Using Session Object
  • Server-Side State Management Using Profile Properties
  • Session Attacks and Its Defensive Techniques
    • Session Hijacking
  • Securing ASP.NET Application from Session Hijacking
  • Implementing SSL tEncrypt Cookies
  • Setting a Limited Time Period for Expiration
    • Avoid using Cookieless Sessions
    • Avoid using UseUri Cookieless Sessions
    • Avoid Specifying Cookie Modes tAutoDetect
    • Avoid Specifying Cookie Modes tUseDeviceProfile
  • Enabling regenerateExpiredSessionID for Cookieless Sessions
  • Resetting the Session when User Logs Out
    • Token Prediction Attack
  • Generating Lengthy Session Keys tPrevent Guessing
  • Session Replay Attack
  • Defensive Techniques for Session Replay Attack
    • Session Fixation
    • Session Fixation Attack
  • Securing ASP.NET Application from Session Fixation Attack
    • Cross-Site Script Attack
  • Preventing Cross-Site Scripting Attack using URL Rewriting
  • Preventing Session Cookies from Client-Side Scripts Attacks
    • Cross-Site Request Forgery Attack
  • Implementing the Session Token tMitigate CSRF Attacks
  • Defensive Techniques for Cross Site Request Forgery Attack
    • Securing Cookie Based Session Management
    • Cookie-Based Session Management
    • Persistent Cookies Information Leakage
    • Avoid Setting the Expire Attribute tEnsure Cookie Security
    • Ensuring Cookie Security using the Secure Attribute
    • Ensuring Cookie Security using the HttpOnly Attribute
    • Ensuring Cookie Security using the Domain Attribute
    • Ensuring Cookie Security using Path Attribute
  • ViewState Security
    • Common Threats on ViewState
  • ViewState Data Tampering Attack
  • ViewState oneClick Attacks
  • Securing ViewStateSecuring
  • ViewState with Hashing
  • Securing ViewState with Encryption
  • Securing ViewState by Assigning User-Specific Key
  • Guidelines for Secure Session Management

Module 06: .NET Cryptography

  • Introduction to Cryptography
    • Cryptographic Attacks
    • What Should You DtKeep the .NET Application Away from Cryptographic Attacks?
    • Cryptography
    • Functions of Cryptography
    • Common Threats on Functions of Cryptography and Their Mitigation Techniques
    • Types of Cryptographic Attacks in .NET
    • .NET Cryptography Namespaces
    • .NET Cryptographic Class Hierarchy
  • Symmetric Encryption
    • Symmetric Algorithm Class
    • Members of the Symmetric Algorithm Class
    • Programming Symmetric Data Encryption and Decryption in .NET
    • Securing Information with Strong Symmetric Encryption Algorithm
    • Cipher Function
  • Cipher Modes
  • Vulnerability in Using ECB Cipher Mode
    • Padding
  • Problem with Zeros Padding
    • Symmetric Encryption Keys
  • Securing Symmetric Encryption Keys from Brute Force Attacks
  • Resisting Cryptanalysis Attack Using Large Block Size
  • Generating Non-Predictable Cryptographic Keys using RNGCryptoServiceProvider
    • Storing Secret Keys and Storing Options
  • Protecting Secret Keys with Access Control Lists (ACLs)
  • Protecting Secret Keys with DPAPI
    • Self Protection for Cryptographic Application
    • Encrypting Data in the Stream using CryptoStream Class
  • Asymmetric Encryption
    • Asymmetric Algorithm Class
    • Members of the Asymmetric Algorithm Class
    • Programming Asymmetric Data Encryption and Decryption in .NET
    • Asymmetric Encryption Algorithm Key Security
    • Securing Asymmetric Encryption using Large Key Size
    • Storing Private Keys Securely
    • Problem with Exchanging Public Keys
    • Exchanging Public Keys Securely
    • Asymmetric Data Padding
    • Protecting Communications with SSL
  • Hashing
    • Hashing Algorithms Class Hierarchy in .NET
    • Hashing in .NET
    • Members of the Hash Algorithm Class
    • Programming Hashing for Memory Data
    • Programming Hashing for Streamed Data
    • Imposing Limits on Message Size for Hash Code Security
    • Setting Proper Hash Code Length for Hash Code Security
    • Message Sizes and Hash Code Lengths Supported by the .NET Framework Hashing
    • Algorithms
    • Securing Hashing Using Keyed Hashing Algorithms
  • Digital Signatures
    • Attacker’s Target Area on Digital Signatures
    • Security Features of Digital Signatures
    • .NET Framework Digital Signature Algorithms
  • Digital Certificates
    • .NET Support for Digital Certificates
    • Programming Digital Signatures using Digital Certificates
  • XML Signatures
    • Need for Securing XML Files
    • Securing XML Files using Digital Signatures
    • Programming a Digital Signature for a Sample XML File

Module 07: .NET Error Handling, Auditing, and Logging

  • Error Handling
    • Parameters tbe Considered while Designing Secure Error Messages!
    • What is an Error?
    • What are Exceptions/Runtime Errors?
    • Need of Error/Exception Handling
    • Secure Exception Handling
    • Exception Handling in ASP.NET
    • Handling Exceptions in an Application
    • Class-Level Exception Handling
    • Class-Level Exception Handling Vulnerabilities
  • Generic Exception Throwing Vulnerability
  • Generic Exception Catching Vulnerability
  • Vulnerability in Printing StackTrace
  • Vulnerability in Exception.ToString() Method
  • Vulnerability in Swallowing Exceptions
  • Cleanup Code Vulnerability
  • Vulnerability in Re-Throwing Exception
  • Rules of Thumb for Good Exception Management
    • Page-Level Exception Handling
    • Application-Level Exception Handling
  • Handling Exception with Application_Error Event Handler
  • Handling Exception with ASP.NET Error Page Redirection Mechanism
  • Managing Unhandled Errors
  • Exposing Detailed Error Messages
  • Sensitive Information Leakage Vulnerability in Custom Error Message
  • Unobserved Exception Vulnerability
  • Exception Handling Best Practices
    • Best Practices for Coding Exceptions Safely
    • Do’s and Don’ts in Exception Handling
    • Guidelines for Proper Exception Handling
    • Error Handling Security Checklists
  • Auditing and Loggin
    • What is Logging and Auditing?
    • Need of Secure Logging and Auditing
    • Common Threats tLogging and Auditing
    • What Should be Logged?
    • What Should NOT be Logged?
    • Where tPerform Event Logging?
    • Performing Log Throttling in ASP.NET Health Monitoring System
    • Windows Event Log
  • Preventing Windows Event Log from Denial of Service Attack
  • Securing Windows Event log
  • Preventing Rogue Administrators from Tampering with Windows Event Logs
    • Centralizing Logging and Configuring its Security
    • Tracing in .NET
  • Writing Trace Output tWindows Event Log Using EventLogTraceListener
  • Auditing and Logging Best Practices
    • Tracing Security Concerns and Recommendations
    • Secure Auditing and Logging Best Practices: Protecting Log Records
    • Secure Auditing and Logging Best Practices: Fixing the Logs
    • Auditing and Logging Security Checklists
  • .NET Logging Tools
    • Apache Foundation’s log4net
    • SmartInspect
    • NLog
    • Logview4net
    • .NET Logging Tools

Module 08: .NET Secure File Handling

  • File Handling
  • System.INamespace Classes
  • Attacks on File and Its Defensive Techniques
    • Path Traversal Attack
    • Protecting Path Traversal Attack
    • Possible Methods tPrevent Path Traversal
  • Canonicalization
    • Canonicalization Attack
  • Protecting the Applications against Canonicalization Attacks
  • Securing Files
    • Securing the Static Files
    • Adding Role Checks tFile Access
    • Securing File I/from Untrusted File Input
    • Securing File I/with Absolute Path
    • Constrain File I/by Configuring Code Access Security Policy
    • Securing User-Specified Files with FileIOPermission
  • Virtual Path Mapping Using MapPath
  • Preventing Cross-Application Mapping Using MapPath
  • Validating File Names using GetFullPath
  • Securing User Uploaded Files
  • File Extension Handling
    • Active Server Pages (ASP) Directory Listing
    • Creating Directory Listing
  • Isolated Storage
    • Isolated Storage – Get Store/ Open Store
    • Isolated Storage Root Location Storage Files
    • Isolated Storage Example
  • File Access Control Lists (ACLs)
    • File ACLs
    • Required .NET Access Control Lists (ACLs)
  • Checklist for Securely Accessing Files

Module 09: .NET Configuration Management and Secure Code Review

  • Configuration Management
    • ASP.NET Configuration Files
    • ASP.NET Configuration File Model
    • ASP.NET Configuration File Locations
    • Configuration Management Threats
  • Machine Configuration File
    • Machine Configuration File: Machinconfig
    • Machinconfig Vulnerability
  • Application Configuration Files
    • Application Configuration File: Web.config
  • Web.config Vulnerabilities: Default Error Message
  • Web.config Vulnerabilities: Leaving Tracing Enabled in Web-Based Applications
  • Web.config Vulnerabilities: Leaving Debugging Enabled
  • Web.config Vulnerabilities: Cookies Accessible through Client-Side Script
  • Web.config Vulnerabilities: Enabled Cookieless Session State
  • Web.config Vulnerabilities: Enabled Cookieless Authentication
  • Web.config Vulnerabilities: Failure tRequire SSL for Authentication Cookies
  • Web.config Vulnerabilities: Using Sliding Expiration
  • Web.config Vulnerabilities: Using Non-Unique Authentication Cookie
  • Web.config Vulnerabilities: Using Hardcoded Credential
  • Web.config Vulnerabilities: Securing List-based Controls using EnableEventValidation
  • Web.config Vulnerabilities: Securing Passwords using PasswordFormat
  • Web.config Vulnerabilities: Changing Default Values of Membership Settings
  • Web.config Vulnerabilities: Securing Against XSS Attack Vulnerabilities
  • Web.config Vulnerabilities: Securing Against DoS Attack Vulnerabilities
  • Web.config Vulnerabilities: Preventing ViewState from Tampering
  • Web.config Vulnerabilities: Securing ViewState with SDL-approved Cryptographic Algorithms
  • Web.config Vulnerabilities: Securing ViewState with Strong Validation Key
  • Web.config Vulnerabilities: Securing ViewState using Encryption
  • Web.config Vulnerabilities: Selecting Right Algorithm for ViewState Encryption
  • Web.config Vulnerabilities: Deploying Application with Strong decryption Key
  • Web.config Vulnerabilities: Ignoring Validation Errors
  • Application Configuration Files: App.exconfig
  • App.exe.config Vulnerabilities
  • Code Access Security Configuration Files
    • Enterprise Policy Configuration File: enterprisesconfig
    • Machine and User Policy Configuration File: security.config
    • ASP. NET Policy Configuration Files
    • .NET Framework Configuration Tool: Mscorcfg.msc
  • Mscorcfg.msc Features
    • Code Access Security Policy Tool: Caspol.exe
  • Configuration Management Best Practices
  • Secure Code Review
    • Why Secure Code Review?
    • Security Code Review Approach
    • Step 1: Identify Security Code Review Objectives
    • Step 2: Perform Preliminary Scan
    • Step 3: Review Code for Security Issue
    • Step 4: Review for Security Issues Unique tthe Architecture
    • Static Code Analysis Tools
  • Parasoft dotTEST Microsoft FxCop StyleCop
  • NDepend
  • ReSharper