Course curriculum

  • 2

    What all is included in the Virtual Lab?

    • Components of Virtual Labs

  • 3

    How to access your Virtual Lab?

    • Your VPN credentials.

    • How to approach Support

  • 4

    Scenario Library

    • Scenario 1: Understand the importance of Reconnaissance phase of attack .Crate a blue print of attack using OSINT.

    • Scenario 2: Practice how to find and exploit SQL Injection vulnerability

    • Scenario 3 : Practice how to find and exploit File upload vulnerability

    • Scenario 4: Understanding about GET flood (DOS) attack

    • Scenario 5: Creating Malicious PDF file and understanding it's execution while the defender is on.

    • Scenario 6: Perform a real VAPT for this 2 websites.

    • Scenario 7: Perform a VAPT for the website

    • Scenario 8: Hacking forensic investigation

    • Scenario 9: Malicious traffic analysis

    • Scenario 10: List out and implement top 10 CIS recommendation for drive by compromise attack .

    • Scenario 11: Perform best security practices on your server