Certified Security Analyst Training

A DOISS Certified Security Analyst is a skilled an ethical hacker who has decent knowledge in networking, web application, data base concepts with practical knowledge on various hacking methodologies.
Foto


DOISS Certified Security Analyst (DCSA)

Duration 2 Months- Regular

Target Audience – Students, Job Seekers & Professionals

Eligibility – Any graduate with IT background or CEH/DCEH candidates. A formal interview will be conducted to analyze your level of knowledge.

Prerequisites – Good knowledge in networking and web technologies.


About DCSA Certification

A DOISS Certified Security Analyst is a skilled an ethical hacker who has decent knowledge in networking, web application, data base concepts with practical knowledge on various hacking methodologies. We in DOISS believe in research, practice and practical approach other than explaining the subject on black board. Our instructors are industry experts with 5years of experience. Who knows how to look for weaknesses and vulnerabilities in target systems in different challenging IT environments.

The purpose of the DCSA

This course is to help you master in penetration testing methodology that can be used in a auditing or testing various IT compliances. You walk out the door with extra-ordinary testing skills that are updated and upto the corporate standards. We give you a sophisticated lab environment to brush up your skills on various scenarios with appropriate tools in hacking world to defend cyber space from hackers.

Note:
1) Having a laptop is an additional advantage for you to practice maximum time.
2) If you are a freebee (expecting the typical deliverables like CDs, DVDs, Books), think once again. Because a hacker / security analyst is the one who Do THE THINGS. He DON’T IMITATE THE THINGS. Remember, We don’t drive a vehicle through reading a book.


Course Description

Module I

Introduction
  • Introduction to Operating System
  • Introduction to Network
  • Introduction to Client & Server Technology
  • Introduction to CLI
  • Phases of Hacking
  • Cyber Crimes & Laws

Module II

Network Security
  • Introduction
  • Understanding Network Connection
  • Understanding Network Devices
  • Understanding Network Protocols
  • Understanding VPN, Proxy & Firewalls
  • Process of Network Hacking
  • Network Mapping
  • Identifying Active Machine
  • Target Scanning
  • PORT & Service Scanning
  • Information Gathering of Target System
  • Vulnerability Assessment
  • Network Exploitation Using Exploit & Virus
  • Getting Reverse Shell & Bind Shell Connection Using Metasploit
  • Post Exploitation & Persistency
  • Patching Vulnerability
  • Report Writing
  • Written and Practical Examination – 2hrs Duration

Module III

Web Security
  • Introduction
  • Understanding Web Layers & Architecture
  • Understanding Client & Server Side Process
  • Information Gathering & Service Scanning
  • Understanding Web Vulnerabilities
  • Introduction to OWASP Top 10 Web Vulnerabilities
  • Injection
  • Input Validation
  • Cross Site Scripting
  • Cross Site Request Forgery
  • Web Remote Code Execution
  • Local & Remote File Inclusion
  • Broken Authentication & Session Management
  • File Upload & Reverse Shell
  • Understanding Different Type Password Encryption
  • Vulnerabilities Fixing
  • Report Writing
  • Written and Practical Examination – 2hrs Duration

Module IV

Wireless Security
  • Introduction Wireless Technology
  • Introduction to Low Power Wireless Communication – WIFI
  • Wi-Fi Protocol Summary
  • Information Gathering of Wireless Asset
  • Understanding Encryption Protocols
  • WLAN Encryption Flaws
  • WEP - WPA - WPA2 Cracking
  • Man In the Middle (MITM) Attacks on Wireless Networks
  • Wireless Auditing
  • Report Writing
  • Written and Practical Examination – 2hrs Duration

Module V

Mobile Hacking
  • Introduction
  • Understanding Mobile Platform & Architecture
  • Android Permission Models
  • Understanding DVM , Android Runtime
  • Mobile Malware Threats
  • Mobile Application Network Traffic Analysis
  • Reversing Mobile Application
  • Remote Access Trojan
  • How to Bind Trojan, Virus With Legit Application
  • Getting Remote Shell Using Trojan & Virus
  • Written and Practical Examination – 2hrs Duration

Module VI

Social Engineering
  • Introduction
  • Information Gathering Of Target
  • Target assessment and analysis
  • Understanding Client & Server Side Attacks
  • Phishing Attack
  • Java Drive By Download Attack
  • Gaining Access Using RAT, Keylogger & Custom Backdoor
  • Final Examination & Interview

We Provide Security Services That Matches Your Needs & Your Budget !

Protecting your peace of mind.

contact us for a competitive price