Kurslar
Qeydiyyat Kurs adı Tarix Qiymət Endirim Qiymət + Endirim Müddət
Installing and Configuring Windows 10 (70-698) 2017-10-05 250 AZN 20 % 200 AZN 1 ay
Prepare for installation requirements
Install Windows 10
Configure devices and device drivers
Post-installation configuration
Implement Windows in an enterprise environment
Configure networking
Configure storage
Configure data access and usage
Implement Apps
Configure remote management
Configure updates
Monitor Windows
Configure system and data recovery
Configure authorization and authentication
Configure advanced management tools
System Administrasiyası 2017-10-05 250 AZN 20 % 200 AZN 6 ay

MICROSOFT WINDOWS TRAINING’S

Installing and Configuring Windows 10 (70-698)
Prepare for installation requirements
Install Windows 10
Configure devices and device drivers
Post-installation configuration
Implement Windows in an enterprise environment
Configure networking
Configure storage
Configure data access and usage
Implement Apps
Configure remote management
Configure updates
Monitor Windows
Configure system and data recovery
Configure authorization and authentication
Configure advanced management tools

Windows Server 2012 Installing and Configuring (70-410) 
Windows Server 2012 Installing and Configuring Introduction (70-410) 
Installing Windows Server 2012 
Introduction to Windows PowerShell 
Installing Active Directory Domain Services 
User Account Management 
Group Account Management 
Computer Account Management 
Working with Organizational Units (OUs) 
Managing Active Directory Domain Services Using PowerShell 
Implementing IPv4 
Implementing IPv6 
Implementing DHCP 
Implementing DNS 
Implementing Local Storage 
Implementing File Services 
Implementing Print Services 
Introduction to Group Policy 
Implementing a Group Policy Infrastructure 
Working with Group Policy Exceptions 
Implementing Server Virtualization with Hyper-V 
Installing Server Core 

Windows Server 2012 Administering (70-411) 
Windows Server 2012 Administering Introduction(70-411) 
Deploying and Maintaining Server Images 
Implementing Patch Management 
Monitoring Windows Server 2012 
Configuring File and Disk Encryption 
Configuring File Server Resource Manager (FSRM) 
Configuring Distributed File System (DFS) 
Configuring Advanced Auditing 
Configuring and Troubleshooting DNS 
Maintaining Active Directory Domain Services 
Implementing Read-Only Domain Controllers 
Configuring Domain Controllers 
Implementing a Group Policy Infrastructure 
Configuring Group Policy Settings 
Configuring Account Policies 
Configuring Group Policy Preferences 
Managing Group Policy Objects 
Configuring VPNs and Routing 
Configuring DirectAccess 
Installing and Configuring a Network Policy Server 
Implementing Network Access Protection (NAP) 

Windows Server 2012 Configuring Advanced Services (70-412) 
Windows Server 2012 Configuring Advanced Services Introduction(70-412) 
New Features of DHCP 
Securing DNS with DNSSEC 
Basic Configuration of Network Load Balancing 
Customizing Network Load Balancing 
Storage Management and Cluster Shared Volumes 
Configuring Quorum 
Cluster Properties and Failover Settings 
Backup and Restore of Failover Clusters 
Cluster-Aware Updating 
Implementing Hyper-V Clustering 
Migrating Hyper-V Virtual Machines 
Managing Hyper-V with SCVMM 
Disaster Recovery Technologies 
Configuring Microsoft Online Backup Service 
Domain and Forest Functional Levels 
Trust Relationships and UPN Suffixes 
Configuring Replication – Sites and Subnets 
Site Link Bridging and Universal Group Caching 
Read-Only Domain Controller Configuration 
Deploying a Certificate Authority 
Templates and Deploying Certificates 
Validating Certificates 
Certificate Recovery 
Rights Management 
Deploying Rights Management 
Configuring Rights Policy Templates 
Exposing RMS Access to External Clients 
Understanding and Installing AD Federation Services 
Claims Providers and Relying Parties 
Claims Provider Trusts/Relying Party Trusts 
Business to Business Federation 

Microsoft Exchange Server
Installation 
User Management 
Configuring Outlook 
Setup Internet Gateway for Exchange 
SMTP Relay Server 
OWA 
Remote Access – POP3 
Information Store 
Public Folders 
Exchange Management 
Exchange Groups, Address list 
Security in Exchange 
Disaster Recovery 
Routing Groups and Connectors 

 
 
Cisco CCNA 2017-10-17 250 AZN 20 % 200 AZN 4 ay
CISCO-CCNA Routing and Switching 

Part I: Networking Fundamentals 
• The TCP/IP and OSI Networking Models 
• Fundamentals of Ethernet LANs
• Fundamentals of WANs
• Fundamentals of IPv4 Addressing and Routing 
• Fundamentals of TCP/IP Transport and Applications 
Part II: Ethernet LANs and Switches 
• Building Ethernet LANs with Switches 
• Installing and Operating Cisco LAN Switches 
• Configuring Ethernet Switching 
• Implementing Ethernet Virtual LANs 
• Troubleshooting Ethernet LANs 
Part III: IP Version 4 Addressing and Subnetting 
• Perspectives on IPv4 Subnetting 
• Analyzing Classful IPv4 Networks 
• Analyzing Subnet Masks 
• Analyzing Existing Subnets 
Part IV: Implementing IP Version 4 
• Operating Cisco Routers 
• Configuring IPv4 Addresses and Routes 
• Learning IPv4 Routes with OSPFv2 
• Configuring and Verifying Host Connectivity 
Part V: Advanced IPv4 Addressing Concepts 
• Subnet Design 
• Variable-Length Subnet Masks 
• Part VI: IPv4 Services 
• Basic IPv4 Access Control Lists
• Advanced IPv4 ACLs and Device Security 
• Network Address Translation
Part VII: IP Version 6 
• Fundamentals of IP Version 6 
• IPv6 Addressing and Subnetting 
• Implementing IPv6 Addressing on Routers 
• Implementing IPv6 Addressing on Hosts 
• Implementing IPv6 Routing 
Part I: LAN Switching 
• Spanning Tree Protocol Concepts
• Spanning Tree Protocol Implementation 
• Troubleshooting LAN Switching 
Part II: IP Version 4 Routing 
• Troubleshooting IPv4 Routing
• Creating Redundant First-Hop Routers
• Virtual Private Networks 
Part III: IP Version 4 Routing Protocols 
• Implementing OSPF for IPv4 
• Understanding EIGRP Concepts 
• Implementing EIGRP for IPv4 
• Troubleshooting IPv4 Routing Protocols
Part IV: Wide-Area Networks 
• Implementing Point-to-Point WANs 
• Understanding Frame Relay Concepts 
• Implementing Frame Relay 
• Identifying Other Types of WANs 
Part V: IP Version 
• Troubleshooting IPv6 Routing 
• Implementing OSPF for IPv6 
• Implementing EIGRP for IPv6 
Part VI: Network Management 555
• Managing Network Devices 
• Managing IOS Files 
• Managing IOS Licensing 

• Final Preparation 
Microsoft Exchange Server 2017-10-27 250 AZN 30 % 175 AZN 1 ay
Installation 
User Management 
Configuring Outlook 
Setup Internet Gateway for Exchange 
SMTP Relay Server 
OWA 
Remote Access – POP3 
Information Store 
Public Folders 
Exchange Management 
Exchange Groups, Address list 
Security in Exchange 
Disaster Recovery 
Routing Groups and Connectors 
Windows Server 2012 Installing and Configuring (70-410) 2017-11-16 250 AZN 0 % 250 AZN 1 ay

Windows Server 2012 Installing and Configuring (70-410) 
Windows Server 2012 Installing and Configuring Introduction (70-410) 
Installing Windows Server 2012 
Introduction to Windows PowerShell 
Installing Active Directory Domain Services 
User Account Management 
Group Account Management 
Computer Account Management 
Working with Organizational Units (OUs) 
Managing Active Directory Domain Services Using PowerShell 
Implementing IPv4 
Implementing IPv6 
Implementing DHCP 
Implementing DNS 
Implementing Local Storage 
Implementing File Services 
Implementing Print Services 
Introduction to Group Policy 
Implementing a Group Policy Infrastructure 
Working with Group Policy Exceptions 
Implementing Server Virtualization with Hyper-V 
Installing Server Core 

Windows Server 2012 Administering (70-411) 2017-11-17 250 AZN 0 % 250 AZN 1 ay

Windows Server 2012 Administering (70-411) 
Windows Server 2012 Administering Introduction(70-411) 
Deploying and Maintaining Server Images 
Implementing Patch Management 
Monitoring Windows Server 2012 
Configuring File and Disk Encryption 
Configuring File Server Resource Manager (FSRM) 
Configuring Distributed File System (DFS) 
Configuring Advanced Auditing 
Configuring and Troubleshooting DNS 
Maintaining Active Directory Domain Services 
Implementing Read-Only Domain Controllers 
Configuring Domain Controllers 
Implementing a Group Policy Infrastructure 
Configuring Group Policy Settings 
Configuring Account Policies 
Configuring Group Policy Preferences 
Managing Group Policy Objects 
Configuring VPNs and Routing 
Configuring DirectAccess 
Installing and Configuring a Network Policy Server 
Implementing Network Access Protection (NAP) 

Linux Redhat RHCSA\RHCE 2017-11-29 250 AZN 20 % 200 AZN 6 ay

RHCSA

 

Understand and use essential tools

●Access a shell prompt and issue commands with correct syntax

●Use input-output redirection (>, >>, |, 2>, etc.)

●Use grep and regular expressions to analyze text

●Access remote systems using ssh

●Log in and switch users in multiuser targets

●Archive, compress, unpack, and uncompress files using tar, star, gzip, and bzip2

●Create and edit text files

●Create, delete, copy, and move files and directories

●Create hard and soft links

●List, set, and change standard ugo/rwx permissions

●Locate, read, and use system documentation including man, info, and files in /usr/share/doc

Note: Red Hat may use applications during the exam that are not included in Red Hat Enterprise Linux for the purpose of evaluating candidate's abilities to meet this objective.

Operate running systems

●Boot, reboot, and shut down a system normally

●Boot systems into different targets manually

●Interrupt the boot process in order to gain access to a system

●Identify CPU/memory intensive processes, adjust process priority with renice, and kill processes

●Locate and interpret system log files and journals

●Access a virtual machine's console

●Start and stop virtual machines

●Start, stop, and check the status of network services

●Securely transfer files between systems

Configure local storage

●List, create, delete partitions on MBR and GPT disks

●Create and remove physical volumes, assign physical volumes to volume groups, and create and delete logical volumes

●Configure systems to mount file systems at boot by Universally Unique ID (UUID) or label

●Add new partitions and logical volumes, and swap to a system non-destructively

Create and configure file systems

●Create, mount, unmount, and use vfat, ext4, and xfs file systems

●Mount and unmount CIFS and NFS network file systems

●Extend existing logical volumes

●Create and configure set-GID directories for collaboration

●Create and manage Access Control Lists (ACLs)

●Diagnose and correct file permission problems

Deploy, configure, and maintain systems

●Configure networking and hostname resolution statically or dynamically

●Schedule tasks using at and cron

●Start and stop services and configure services to start automatically at boot

●Configure systems to boot into a specific target automatically

●Install Red Hat Enterprise Linux automatically using Kickstart

●Configure a physical machine to host virtual guests

●Install Red Hat Enterprise Linux systems as virtual guests

●Configure systems to launch virtual machines at boot

●Configure network services to start automatically at boot

●Configure a system to use time services

●Install and update software packages from Red Hat Network, a remote repository, or from the local file system

●Update the kernel package appropriately to ensure a bootable system

●Modify the system bootloader

Manage users and groups

●Create, delete, and modify local user accounts

●Change passwords and adjust password aging for local user accounts

●Create, delete, and modify local groups and group memberships

●Configure a system to use an existing authentication service for user and group information

Manage security

●Configure firewall settings using firewall-config, firewall-cmd, or iptables

●Configure key-based authentication for SSH

●Set enforcing and permissive modes for SELinux

●List and identify SELinux file and process context

●Restore default file contexts

●Use boolean settings to modify system SELinux settings

●Diagnose and address routine SELinux policy violations

 

 

RHCE

 

System configuration and management

●Use network teaming or bonding to configure aggregated network links between two Red Hat Enterprise Linux systems

●Configure IPv6 addresses and perform basic IPv6 troubleshooting

●Route IP traffic and create static routes

●Use firewalld and associated mechanisms such as rich rules, zones and custom rules, to implement packet filtering and configure network address translation (NAT)

●Configure a system to authenticate using Kerberos

●Configure a system as either an iSCSI target or initiator that persistently mounts an iSCSI target

●Produce and deliver reports on system utilization (processor, memory, disk, and network)

●Use shell scripting to automate system maintenance tasks

Network services

Network services are an important subset of the exam objectives. RHCE candidates should be capable of meeting the following objectives for each of the network services listed below:

●Install the packages needed to provide the service

●Configure SELinux to support the service

●Use SELinux port labeling to allow services to use non-standard ports

●Configure the service to start when the system is booted

●Configure the service for basic operation

●Configure host-based and user-based security for the service

HTTP/HTTPS

           

●Configure a virtual host        

●Configure access restrictions on directories

●Deploy a basic CGI application

●Configure group-managed content

●Configure TLS security

                                                                                                                       

DNS

           

●Configure a caching-only name server

●Troubleshoot DNS client issues

NFS

           

●Provide network shares to specific clients

●Provide network shares suitable for group collaboration

●Use Kerberos to control access to NFS network shares

SMB

           

●Provide network shares to specific clients

●Provide network shares suitable for group collaboration

SMTP

           

●Configure a system to forward all email to a central mail server

SSH

           

●Configure key-based authentication

●Configure additional options described in documentation

NTP

           

●Synchronize time using other NTP peers

Database services

           

●Install and configure MariaDB

●Backup and restore a database

●Create a simple database schema

●Perform simple SQL queries against a database

 

BASH SCRIPTING
Bash Files - .bash_profile .bashrc
Displaying Environment Variables in a Script
Using Variables on the Command Line
Setting and Using Variables in Scripts
Comment Types and Structure
Exit Status
Arithmetic Operations
Global and Local Environment Variables
Special Characters - Quotes and Escapes
Exercise: Using Arrays
If/Then/Else
For Loop
Case Statement
While Loop
Until Loop
Oracle 2017-11-29 250 AZN 0 % 250 AZN 5 ay
Introduction
Oracle Database Architecture
Installing Oracle and  Creating Database
Database startup and shutdown modes
Database Storage (Tablesapces)
Schemas Objects
Oracle Net Services
Shared Server
And Oracle net Practice
Oracle User Administration and Security
Audit Database
Data Pump (Export/Import)
PL/SQL
Managing Consistency and Concurrency
Performance Monitoring
Configure Archive log
Backup and Recovery Concepts
Flashback Technology
Database Recovery
Configuring Recovery Manager
Using RMAN (Backupset , Incremental backup)
Recovering from non-critical losses
Database Recovery
Flashback Database
Recovering from User Errors
Handling block corruption
Performance Tuning
Automatic Storage Management
Globalization Support
Managing Resource
Managing Resources
Automating Tasks with the Scheduler
Manitoring and Managing Storage
Securing Oracle Listener , Diagnosting memory
SQL Server 2017-12-18 250 AZN 0 % 250 AZN 2 ay
 Introduction
 Welcome to Microsoft SQL Server 
 Installing SQL Server 
 An Introduction to SQL Server  Tools
 Creating SQL Server Databases
 Configuring SQL Server Security
 SQL Server Implementing Disaster Recovery 
 SQL Server Performance
 SQL Server Automating Administrative Tasks 
 SQL Server High Availability
 SQL Server Replication
 Resource Governor
 Performing Data Management Task
 Data Compression
 SQL Server  Common Commands
 Database Mail
 Certification 
Building Cross-Platform iOS/Android Apps with Xamarin, Visual Studio and C# 2017-12-20 250 AZN 0 % 250 AZN 1 ay
Swipe-Navigation in Android
Swipe-Navigation in iOS
Working with iOS Protocols
Android Master/Detail Navigation
Android Navigation Drawer
iOS Master/Detail Navigation
Windows Server 2012 Configuring Advanced Services (70-412) 2017-12-20 250 AZN 0 % 250 AZN 1 ay

Windows Server 2012 Configuring Advanced Services (70-412) 
Windows Server 2012 Configuring Advanced Services Introduction(70-412) 
New Features of DHCP 
Securing DNS with DNSSEC 
Basic Configuration of Network Load Balancing 
Customizing Network Load Balancing 
Storage Management and Cluster Shared Volumes 
Configuring Quorum 
Cluster Properties and Failover Settings 
Backup and Restore of Failover Clusters 
Cluster-Aware Updating 
Implementing Hyper-V Clustering 
Migrating Hyper-V Virtual Machines 
Managing Hyper-V with SCVMM 
Disaster Recovery Technologies 
Configuring Microsoft Online Backup Service 
Domain and Forest Functional Levels 
Trust Relationships and UPN Suffixes 
Configuring Replication – Sites and Subnets 
Site Link Bridging and Universal Group Caching 
Read-Only Domain Controller Configuration 
Deploying a Certificate Authority 
Templates and Deploying Certificates 
Validating Certificates 
Certificate Recovery 
Rights Management 
Deploying Rights Management 
Configuring Rights Policy Templates 
Exposing RMS Access to External Clients 
Understanding and Installing AD Federation Services 
Claims Providers and Relying Parties 
Claims Provider Trusts/Relying Party Trusts 
Business to Business Federation 

 
Cisco CCNP 2018-02-28 250 AZN 0 % 250 AZN 4 ay
                                                                                      CCNP ROUTE 300-101 
1. Route Fundamentals 
1.1 Routing in Network Structure. Routing Protocol Types and Selection.
1.2 Network Traffic and Architecture Types.
1.3 TCP/IP Fundamentals. 

2. Remote Connectivity 
2.1 MPLS VPN: Layer 2 MPLS VPN, Layer 3 MPLS VPN.
2.2 GRE Tunneling.
2.3 DMVPN, NHRP.
2.4 IPSec
Practise: Configuring GRE Tunnel, Multipoint GRE Tunnel. 

3. RIPNG - 1 lesson
3.1 IPv6 Overview. Configuration IPv6.
3.2 RIPng. Configuring RIPng.
Practice: 
Configuration IPv6: Static Configuration, Static Configuration with EUI-64, Stateless Autoconfig.
Configuration RIPng.

4. EIGRP - 2 lesson
4.1 EIGRP Fundamentals.
4.2 EIGRP Neighborships.
4.3 EIGRP Messages.
4.4 EIGRP over WAN.
4.5 Building Routing Table. Route Filtering and Summarization.
4.6 EIGRP convergence.
4.6 EIGRP IPv6 and Named EIGRP.
Practise: Configuring EIGRP, debug messages, neighborship states.
Practise: Load Balancing over unequal path, Route Filtering, Summarization.

5. OSPF - 3 lessons.
5.1 OSPF Neighborships and adjacencies
5.2 OSPF Area structure, virtual links.
5.3 OSPF Database, OSPF Messages.
5.4 OSPF Stub Zones. 
5.5 OSPF Route Filtering and Summarization.
5.6 OSPFv3.
Practise
1. Configuring OSPF. Configure OSPF areas, virtual link. Debug OSPF Messages.
2. Configure OSPF Stub zones. Change route metrics.
3. Configure Route Filtering, Area 3 Summarization.

6. Route Redistribution - 1 lesson.
6.1 Route Redistribution basic.
6.2 Redistribution in EIGRP.
6.3 Redistribution in OSPF.
6.4 Redistribution with route-map and distribute lists.
6.5 Redistribution Issues.
Practise: Configure Redistribution between EIGRP and OSPF. Solve multipoint redistribution issues.

7. Route Selection - 1 lesson.
7.1 CEF, Proccess Swithcing, Fast Switching.
7.2 Policy-Based Routing.
7.3 IP SLA
Practise:
1. Configure Policy-Based Routing.
2. IP SLA: Configure backup default route.

8. Internet Connectivity - 2 lessons.
8.1 NAT Types. Public and Private address.
8.2 Fundamentals BGP. BGP Attributes and ASNs.
8.3 BGP Neighborships: Internal and External. 
8.4 BGP Messages. Buildin Route Table.
8.5 Inject BGP Routes. Route Filtering.
8.6 BGP Path Attributes.
8.7 BGP for IPv6.
Practise:
1. Configure BGP. Configure external and internal neighborships. Inject Routes.
2. Configure BGP. Best path selection: Weight, MED, Local Preference, As_Path, Origin, Next Hop.


9. Routing and Router Security - 1 lessons.
9.1 Router Security: Access lists, Access to Router, password security policy, AAA.
9.2 Routing Protocol Security: Authentication Methods, Authentication in EIGRP, BGP, OSPF.  
Practise: Configure authentication for BGP, EIGRP, OSPF.


                                                                                                 CCNP SWITCH 300-115


1. Network Design - 1 lesson.
1.1 Hierarchical Network Design. Access, Distribution, Core Layer.
1.2 Switch Block Redundancy.
1.3 Cisco Switch models overview.
1.4 Layer 2 Switch Operation.
1.5 Multilayer Switch Operation.
1.6 Switch Tables.

2. Switchport Configuration - 1 lesson.
2.1 Ethernet Concepts
2.2 Switchport configuration
2.3 Troubleshooting switchport operation.
2.4 CDP, LLDP.
2.5 PoE.

3. VLAN and Trunks. - 1 lesson
3.1 Virtual Lan. Static and Dynamic Vlans.
3.2 VLAN Trunks. Trunk Protocols.
3.3 DTP.
3.4 Troubleshooting Vlan and Trunks.
3.5 Voice and Wireless Vlan.
3.6 VTP. Configuring and Troubleshooting VTP.
Practise:
1. Configure Vlan and Trunk.
2. Configure VTP. Troubleshoot.

4. STP - 4 lessons
4.1 Switching Loop.
4.2 STP Concepts.
4.3 Root Bridge, Root Ports and Designated Port     Election.
4.4 STP States. STP Timers
4.5 STP Types.
4.6 STP Configuration.
4.7 STP Link Convergence
4.8 Troubleshooting STP.
4.9 STP Security. Protect STP Topology.
4.10 Advanced STP. Rapid-STP, MSTP.
4.11 Link Aggregation Protocol: LACP, PAgP.
Practise:
1. Configuring STP. Monitoring STP
2. Configure STP features: Portfast, UplinkFast, BackboneFast.
3. STP Security. Configure STP security features: bpduguard, bpdufilter, udlc, rootguard, loopguard.
4. Configure LACP, PAgP.


5. Multilayer Switch - 1 lesson.
5.1 InterVlan Routing.
5.2 Multilayer Switch Operation.
5.3 CEF, FIB, Adjency Table.
5.4 DHCP in Multilayer Switch. IPv6 DHCP.
Practise: Configure InterVlan Routing, DHCP.

6. Monitoring Networs - 1 lesson.
6.1 Syslog.
6.2 NTP.
6.3 SNMP. 
6.4 IP SLA.
6.5 SPAN, RSPAN.

7. High Aviability - 1 lesson.
7.1 StackWise, Virtual Switching System.
7.2 HSRP.
7.3 VRRP.
7.4 GLBP. 
Practise: Configure HSRP.

8. Security of Switching Network - 2 lessons.
8.1 Port Security.
8.2 Port-Based Authentication. 802.1x protocol. 
8.3 Storm Control.
8.4 Vlan ACL. Private Vlan.
8.5 Trunk Security.
8.6 DHCP Snooping. IP Source Guard. ARP Inspection.
8.7 AAA service.
Practise:
1. Configure Port Security.
2. Configure 802.1x.
 
İT Security 2018-03-07 250 AZN 0 % 250 AZN 3 ay
Syllabus
Introduction to Proactive Security
 Hacker, Hacking definition and hacker types
 General Hacking terminology
 Hacking phases and hacking methodologies
 Lab environment setup
Getting ready
 Introduction and Installing Kali Linux
 General overview and usage of Kali Linux
Information gathering phase
 General understanding of footprinting
 Passive information gathering
 Footprinting through WHOIS, Search Engines, GHDB, Maltego, Email harvesting, Netcraft, extracting meta information from files, Vulnerability Databases and etc.
 Active Information gathering
 Footprinting through Forward and reverse DNS lookup
 DNS zone transfers
 HTTP service and web application footprinting
 Port Scanning
 Passive OS fingerprinting
 Automating most of the tasks using Bash scripting
 Port Scanning (in-depth overview)
 TCP connect,SYN,ACK,FIN,XMAS,Idle scan techiques
 UDP scanning techniques
 Banner grabbing
 OS fingerprinting
 Gathering information using NSE scripting and vulnerability discovery
Enumeration phase
 SMB enumeration
 Null session enumeration
 SMTP enumeration
 SNMP enumeration
 FTP enumeration
Vulnerability discovery
 Scanning systems for vulnerability: OpenVAS, nikto,w3af and many more
Introduction to NetCat
 General overview
 Chat between computers
 Getting Reverse and Bind shell
 File Transfers
Introduction to Metasploit
 General overview
 Information gathering using MSF (active and passive)
 Case: Exploiting vulnerabilities using MSF
 Generating Payloads
 Meterpreter: Dumping Usernames and passwords, Privilege escalation, Token Impersonation, Pivoting
 MSF post exploitation
Privilege Escalation
 Case: Privilege escalation in Windows
 Case: Privilege escalation in Linux
Client-side attacks
 Information gathering about target
 Using Social Engineering
 Case: Leveraging browser based vulnerabilities
 Case: Using Java Applet attack
Changing public exploits for our use
 Case: Editing bind exploit for getting reverse shell exploit
Password attacks
 Cracking SSH,FTP,VNC,RDP,HTTP basic authentication with various tools
 Creating own Bruteforcer with python
 Dumping SAM database with various tools
 Getting clear-text passwords from memory with various techniques
Web application attacks
 Mapping the application
 Analyzing input points
 Testing for Client-side controls
 Authentication tests
 Authorization and Session management tests
 Access control tests
 Chained attacks
 Fuzzing for web vulnerabilities
 Exploiting vulnerabilities: SQL injection, XSS, CSRF, LFI/RFI, Insecure Direct Object reference, XXE,SSRF
Buffer Overflows in Win32
 General overview
 Fuzzing
 Replicating Crash
 Controlling EIP and avoiding bad characters
 Writing final exploit