CyberHQ
  • Company
    • About US
    • Our Team
    • clients
  • Services
    • Penetration Testing
      • Web Application Penetration Testing
      • Mobile Application Penetration Testing
      • IoT Device Penetration Testing
      • API Penetration Testing
      • Network Penetration Testing
      • Cloud PT
    • Managed Security
      • Deep / Dark Web Monitoring
      • Cloud Security & Compliance Management
      • Security Orchestration Automation & Response (SOAR)
      • Vulnerability Management & Prioritization
      • SOC Monitoring 24/7
    • Compliance
      • PCI Compliance Consulting
      • HIPAA Compliance Consulting
      • ISO 27001 Consulting Grow Your Brand’s Trust Globally
      • RBI Cyber Security Compliance for Banks
      • GDPR Implementation and Readiness
      • ISO 27001:2022 Compliance
      • SEBI Cyber Security Compliance
      • DPDPA, 2023 Compliance Consulting
    • Configuration Device
      • Data Loss Prevention Configuration Audit
      • OS/Network Hardening
      • Router/Switches Configuration Audit
      • Active Directory Configuration Audit
      • Endpoint Security Configuration Audit
      • Firewall Configuration Audit
    • Development
      • Website Development
      • Web Application Development
      • Mobile Application Development
      • Game Development
    • Digital Marketing
      • Paid Search Advertising
      • Whatsapp Marketing
  • Resource
    • Case studies
    • Blog
  • Contact US
  • CONTACT US

Learning Philosophy

Introduction
1. Penetration Testing Process
2. Getting Started
Reconnaissance, Enumeration & Attack Planning
3. Network Enumeration with Nmap
4. Footprinting
5. Information Gathering - Web Edition
6. Vulnerability Assessment
7. File Transfers
8. Shells & Payloads
9. Using the Metasploit Framework
Exploitation & Lateral Movement
10. Password Attacks
11. Attacking Common Services
12. Pivoting, Tunneling, and Port Forwarding
13. Active Directory Enumeration & Attacks
Web Exploitation
14. Using Web Proxies
15. Attacking Web Applications with Ffuf
16. Login Brute Forcing
17. SQL Injection Fundamentals
18. SQLMap Essentials
19. Cross-Site Scripting (XSS)
20. File Inclusion
21. File Upload Attacks
22. Command Injections
23. Web Attacks
24. Attacking Common Applications
Post-Exploitation
25. Linux Privilege Escalation
26. Windows Privilege Escalation
Reporting & Capstone
27. Documentation & Reporting
28. Attacking Enterprise Networks

Posted on November 15, 2024.

Address: 309, Swastik Plaza,Yogi Chowk-Varachha, Surat, Gujarat 395006

Get in Touch

  • +91 98985 82859
  • inf@cyberhq.in
  • 309, Swastik Plaza,
    Yogi Chowk, Surat-6.
  • SEND A MESSAGE

Our Services

  • Website Development
  • Building Applications
  • SEO & Digital Marketing
  • Branding and Identity
  • Digital Images & Videos

Popular Tags

Mobile Development Technology App Education Business Health Industry
Search

What are you looking for?

Search for services and news about the best that happens in the world.

Menu