Welcome to AnshInfotech

Welcome to Ansh Infotech, Ludhiana'a leading IT Solutions provider. (Build Your Digital Empire with Us)

CS Course IN CYBER SECURITY ( S-CS-102 )

BASIC INFORMATION

  • Course Fees : 30000.00 35000.00/-
  • Course Duration : 6 MONTHS
  • Minimum Amount To Pay : Rs.1000.00

Month 1: Foundations of Pentesting

Introduction to Pentesting

- Understanding the pentesting lifecycle: Reconnaissance, Scanning, Exploitation, Post-exploitation, Reporting.

- Overview of pentesting methodologies: OWASP, OSSTMM, PTES.

- Legal and ethical considerations in pentesting.

Networking Essentials

- OSI & TCP/IP models.

- Key protocols: HTTP(S), TCP, UDP, DNS, SMTP.

- Basic network scanning and analysis tools: Nmap, Wireshark.

Linux Basics for Pentesters

- Command-line essentials (file management, networking, permissions).

- Tools: netcat, grep, awk, sed.

- Bash scripting fundamentals.

Month 2: Web Application Pentesting - Part 1

Understanding Web Technologies

- HTML, CSS, JavaScript, HTTP/HTTPS, cookies, sessions.

- Common web servers: Apache, Nginx.

Introduction to OWASP Top 10

- In-depth understanding of OWASP Top 10 vulnerabilities.

- Examples of vulnerabilities and basic manual exploitation.

Basic Reconnaissance and Scanning

- Information gathering: WHOIS, DNS enumeration, subdomain enumeration.

- Tools: Burp Suite, Nikto, dirbuster, gobuster.

 

Month 3: Web Application Pentesting - Part 2

Advanced Web Vulnerability Exploitation

 

- SQL Injection, XSS, CSRF, SSRF.

- Authentication and session management attacks.

- API Pentesting basics.

Automating Web Attacks

- Using Burp Suite's Intruder, Repeater, and Scanner.

- Automating testing with tools like OWASP ZAP and XSStrike.

Web Application Firewalls (WAF) Bypass Techniques

- Understanding WAF mechanisms.

- Techniques for bypassing WAFs: encoding, payload obfuscation.

 

Month 4: Cloud Security and Pentesting

Cloud Computing Basics

 

- Understanding cloud models (IaaS, PaaS, SaaS).

- Overview of cloud providers: AWS, Azure, Google Cloud.

Cloud Security Fundamentals

- Identity and Access Management (IAM) in cloud.

- Shared responsibility model.

- Key cloud vulnerabilities: misconfigurations, data leaks.

Practical Cloud Pentesting

- Exploiting cloud misconfigurations.

- Tools: ScoutSuite, Prowler, Pacu.

- Practical exercises with AWS (IAM, S3 bucket testing, EC2 exploitation).

 

Month 5: Android Pentesting

Android Fundamentals

 

- Overview of Android OS and application architecture.

- Android app components: Activities, Services, Broadcast Receivers, Content Providers.

Android App Pentesting Basics

- Setting up Android pentesting environment: AVD, Genymotion, Android Studio.

- Tools: APKTool, JADX, Frida, Burp Suite.

Analyzing and Exploiting Android Apps

- Static analysis: APK decompilation, code review.

- Dynamic analysis: Debugging and hooking with Frida.

- Common Android vulnerabilities: Insecure storage, insecure communication, hardcoded secrets.

 

Month 6: Advanced Topics & Final Project

Advanced Mobile Exploits

 

- Root detection bypass, SSL pinning bypass.

- Deep dive into Android malware and reverse engineering.

Final Project - End-to-End Pentest

- Realistic pentesting simulation covering web, cloud, and Android app components.

- End-to-end report creation, following professional pentesting standards.

Review and Certification Preparation

- Mock interviews and practical exams.

- Preparation for certifications like eJPT, CEH, or OSCP (intro level).

  • Basic IT and Networking Knowledge:
    Understand how computers, operating systems (Windows, Linux), and networks work. Learn key concepts like IP addresses, DNS, firewalls, TCP/IP, and basic networking protocols.

  • Familiarity with Programming and Scripting:
    Learn at least one programming language (Python is highly recommended) and basic scripting to automate tasks. This will help you understand exploits, write scripts, and analyze malicious code.

  • Cybersecurity Fundamentals:
    Study core topics like cryptography, malware analysis, penetration testing, ethical hacking, incident response, and security frameworks (e.g., OWASP).

  • Hands-On Practice:
    Use online platforms like TryHackMe, Hack The Box, or CTF challenges to practice real-world scenarios. Build your own lab environment with tools like VirtualBox, Kali Linux, and Metasploit to experiment safely.