OMST3556.jpg

Hacking Webinar

March 3, 2022 - April 23, 2022 

Hello I'm Kunj Joshi, Cybersecurity Mentor at Programming with Maurya. I was interested in Cybersecurity since the beginning, in exploiting vulnerabilities and more in patching them. This webinar had been a source of propagating the knowledge I had to other students and making them realise the need of cyber safety in today's world. I learned various different kinds of attacks and how to patch them up, learnt about different meritable certifications in Cybersecurity and how to prepare for them and most importantly, I learnt more about the nature of security from the Students.  It was a fun and enriching experience which I suggest everyone should enroll for. Thank You

Course Curriculum
Register Now
Reviews

Information Security

Introduction to Cyber Security

Malware and its types

Helpful Security Material

Kali Linux and Introduction

Metasploitable

 Cyber Security Preventive and Mitigative Methods

Python For Cyber Security

  1. Cyber Security and Information Security

  2. Why Information Security? CIA Triad

  3. Situational Examples on need of Information Security

  4. Encryption and Decryption

  5. Roots: Caesar Cipher

  6. Stream vs Block Cipher

  7. Permutation vs Substitution Cipher

  8. Vigenere Cipher

  9. Hill Cipher

  10. Rail Fence Cipher

  11. Transposition Cipher

  12. 6x6 Playfair Cipher

  13. Modern Block Based Ciphers: Fiestel Structure

  14. Number Theory

  15. DES

  16. Limitations in DES

  17. AES

  18. RSA

  19. Hashing and its uses

  20. Commonly used Hashing Algorithms: MD5 and SHA256

  21. MD5 and its working

  22. SHA256 and its working

  23. Message Aunthentication Code

  24. HMAC

  25. Attacks on Data

  1. What is Cyber Security?

  2. The Need of Cyber Security and its Situational Examples

  3. Cyber Security vs Information Security

  4. Cyber Crimes and their Classification

  5. Cybersecurity Terminology

  6. Cyber Warfare

  7. Challenges in Cyber Security

  8. Types of Hackers

  9. Types of Malwares

  10. Cyber laws in India

  11. Vulnerabilities and Its Types

  12. Authorisation and Authentication 

  13. Preventive Methods

  14. How to learn Cybersecurity

  15. Practical Cybersecurity

  16. Scopes in Cyber Security: Jobs available

  17. Certifications

  18. Web Application Hacking

  19. Airport Hacking

  20. Steps in Cyber Security/ Penetration Testing

  1. Malwares and its Types

  2. Different Types of Attacks

  3. SQL Injection

  4. OS Command Injection

  5. Keylogger

  6. Viruses and Their Implications

  7. Worms and Their Implications

  8. Trojan Horses and Their Implications

  9. Brute Force Method

  10. Zero Day Attacks

  11. Dos and Ddos

  12. Man In The Middle Attack

  13. Social Engineering

  14. Phishing and Spear Phishing

  15. Cross Site Scripting (XSS)

  16. Ransomware

  17. Adware

  18. Bloatware

  19. Spyware

  20. Session Hijacking

  21. OWASP Top 10

  22. Dictionary Attack

  23. Backdoors and Trapdoors

  24. Buffer Overflow

  25. Hardware Based: Directory Traversal, Rowhammer and Meltdown

  1. Google Dorks or GHDB

  2. Shodan: The Hacker's Search Engine

  3. Kali Linux

  4. Metasploitable Machine

  5. Google Based Hacking

  6. Steganography, Dark Web and Blockchain

  7. Websites which are useful or hackers

  1. Installing Kali Linux iso and Virtual Box

  2. Basics of Linux

  3. Reconaissance: nmap

  4. Burpsuite

  5. OWASP ZAP Tool

  6. First attack with help of Hackthebox.com

  7. Phishing using Kali Linux

  8. WPScan

  9. John The Ripper

  10. Hydra

  11. Weevely

  12. Ettercap

  13. Advanced Tools: Aircrack-ng and msfvenom

  1. What is Metasploitable Machine?

  2. Metasploitable Basics,Exploits and Payloads

  3. Rapid7 Website

  4. Understanding Modules

  5. Information Gathering: Auxillary Modules

  6. Basic Exploitation

  7. First attack on Metasploit Machine by creating FTP Backdoor

  1. Virtual Private Networks

  2. Basic Workplace Security Measures

  3. Firewall

  4. Code Obfuscation

  5. Regex

  6. Code Scrutiny

  7. Secure Connections and Broadband

  8. Preventing DoS and DDoS

  9. Antivirus Softwares

  10. Affects of Infection

  11. How to secure data once infected? Mitigation

  1. Different Encryption, Decryption and Hashing Algorithms

  2. Keylogger in Python

  3. Web Scraping/ Web Crawling Using Python

  4. Brute Force Creator

  5. Network Scanner using Python

  6. Automated Mailing in Python

 
 

Time : 6 PM to 8 PM IST
Venue: Zoom 
Duration: 2 Months

Every Saturday and Sunday


Will start on from: March 5, 2022

Last Date for Registration: March 2, 2022

Registration Fee: 490/- INR
For international payments please mail us at programmingwithmaurya@gmail.com for registration.

Get Assignments and notes.

And get a verified certificate after completion of the webinar.

You can also mail us for recorded lectures.


We may conduct competition on hacking.*

First position :- 5000/- INR

and top 5 performers will get 1500/- INR each.

*Depending upon the numbers of participated students.

 

Very informative and interesting, all the webinars were interactive and helped in clarifying next steps for everyone. The activities conducted in the webinars helped me to get more closer to my goal. "

-Dhyani Upadhyay

Certification

  • Upgrade your Resume

  • Performance-Based Recognition

  • Achieve Domain Excellence

of Participation.png