Duration
12 MonthsPlacement Support
100%*Course Fee
Rs. 80,000/-Easy EMI
AvailableClass Mode
Online + Offline*Extra Benefits
FREE DataSpace Lab AccessThe Job Guaranteed Program In Cybersecurity by Dataspace Academy expedites your career in cybersecurity and provides you with industry-relevant training and skills required to succeed. This particular course is designed to give you a competitive edge to kickstart your career in cybersecurity.
We are proud to express our support for the cybersecurity initiative by the Indian Government, with the help of Cyber Swachhta Kendra, Indian CERT, and Cyber Security Awareness programs. These initiatives emphasize on raising awareness and promoting safe internet practices. It pledges to promote and adhere to these practices as a responsible member of the digital community.
#IndianCERT # CyberSwachhtaKendra #DigitalIndia #CyberSecurityAwareness
Basic of computer network
Explain network & types of network
Understand & compare Broad network categories
Understand and Explain OSI Model
Describe 7 layers of OSI
Explain PDU in OSI model
Explain types of networking media
Understand and explain coaxial cables, Twisted pair cables, Fiber optic cables
Understand straight cable & crossover cable
Structured Cabling
Understand networking devices and its use
Understand and Explain Topology and it need
Explain different types of physical topologies used in networking
Understand about ip address
Explain about IP Version 4 classes and Subnet Mask
Configuring and verifying IP Address
Understand and explain about TCP/IP
Compare OSI Model and TCP/IP Model
Explain Layer in TCP/IP Model
Understanding Ports and Protocol
Details of Subnetting
Router Configuration & Firewall Rules
What is VPN and How it's Work
Understanding Web Application Structure
Detailed in Html Request And Response
Linux Basic Commands
Introduction To Cloud Computing
Cloud Computing Models
Benefits Of Cloud Computing
Private Cloud
Hybrid Cloud
Software As A Service (SAAS)
Platform As A Service(PAAS)
Infrastructure As A Service (IAAS)
Introduction to Ethical Hacking
Lab Setup
Steps of Ethical Hacking
Google Hacking Using Dorks Demo
What is Nmap
Port and Service Scanning with Nmap
Nmap Various Command
Network Scanning using Nmap
Network Vulnerability Scanning using Nessus
Making Report After Successful Scan
What is Metasploit
Exploit using Metasploit
Windows 7 Hacking using Zero-Day
Windows 10 Hacking using msfvenom
Android Hacking using msfvenom
Wireshark
How to intercept Login details from network using Wireshark
Denial of Service Attack
Wifi Password Hacking using aircrack-ng
How to secure Wifi Network
Web Application Testing Methodology
OWASP Top 10 -2022
What is Sql Injection vulnerability
Types of Sql Injection
Sql-Injection Exploit using Sqlmap
Business impact of Sql Injection vulnerability
How to Resolve the issue from application
What is XSS vulnerability
Types of Cross-site Scripting vulnerability
Demonstration of XSS
How to Resolve the issue from application
Directory Listing Vulnerability
Demonstration of Directory Listing vulnerability
What is Data Tampering vulnerability
Demonstration of Data Tampering
File Upload Vulnerbility
What is web shell hacking
Demonstration of this vulnerability
Cross Site Request Forgery
Demonstration of this vulnerability
Insecure Direct Object Reference
Report Making in Web Application VAPT
Social Engineering Attack
SE toolkit Tutorial
RAT Tutorial
Mobile Device Architecture and common mobile threats
Android Architecture
Reverse Engineering and Static Application Analysis
Best practices and security guidelines for the mobile applications
Intro to PowerShell Scripting
Powershell commends for Pentester
PowerShell with Metasploit Meterpreter
Web Application Basics (Structure, Components)
OWASP Top 10 Vulnerability & Testing Methodology
Burp Suite Advance Usages by installing Plugins
Information Gathering/Recon
Information Gathering/ReconTools Covered- Gobuster, FFUF, WFUZZ, Feroxbuster, gau, Linkfinder, waybackurls, Assetfinder , Subfinder, Amass, httpx,httprobe
Manual Recon : Shodan, whois Lookup, Censys, Nuclei, Arjun Framework
SQL injection vulnerability in WHERE clause allowing retrieval of hidden data
SQL injection vulnerability allowing login bypas
SQL injection UNION attack, determining the number of columns returned by the query
SQL injection UNION attack, finding a column containing text
SQL injection UNION attack, retrieving data from other tables
SQL injection attack, querying the database type and version on Oracle
SQL injection attack, listing the database contents on Oracle
Blind SQL injection with time delays and information retrieval
Blind SQL injection with out-of-band interaction
Reflected XSS into HTML context with nothing encoded
Stored XSS into HTML context with nothing encoded
Reflected XSS into attribute with angle brackets HTML-encoded
Reflected XSS into a JavaScript string with angle brackets HTML encoded
Reflected XSS with some SVG markup allowed
Exploiting XSS to perform CSRF
Reflected DOM XSS
Stored DOM XSS
Basic SSRF against the local server
Basic SSRF against another back-end system
Basic SSRF against the local server
Basic SSRF against another back-end system
SSRF with blacklist-based input filter
SSRF with filter bypass via open redirection vulnerability
Blind SSRF with out-of-band detection
SSRF with whitelist-based input filter
Blind SSRF with Shellshock exploitation
OS command injection, simple case.
Blind OS command injection with time delays
Blind OS command injection with output redirection
Blind OS command injection with out-of-band interaction
Blind OS command injection with out-of-band data exfiltration
File path traversal, traversal sequences blocked with absolute path bypass
File path traversal, traversal sequences stripped non-recursively
File path traversal, traversal sequences stripped with superfluous URL-decode
File path traversal, validation of start of path
File path traversal, validation of file extension with null byte bypass
Username enumeration via different responses
2FA simple bypass
Password reset broken logic
2FA broken logic/p>
Username enumeration via subtly different responses
Username enumeration via response timing
Broken brute-force protection, IP block
Remote code execution via web shell upload.
Web shell upload via Content-Type restriction bypass
Web shell upload via path traversal
Web shell upload via race condition
CORS vulnerability with basic origin reflection.
CORS vulnerability with trusted null origin
CSRF where token validation depends on request method.
CSRF where token validation depends on token being present
CSRF where token is not tied to user session
CSRF where token is duplicated in cookie
No-Rate Limiting
IDOR
Introduction
Mobile Application Testing set up
OWASP Top 10 of Mobile Application Penetration Testing
Apk File Structure
OSINT Framework
Port Exploitation
Privilege Escalation (Windows & Linux)
Persistence
Process Migrations
Latest CVEs Exploitation
Router Exploitation
Firewall Exploitation
AV Evasion
CTF : Kioptrix level 1-3, Magic
Cloud Penetration Testing Lab set up
OWASP Top 10 Vulnerability for Cloud Security
EC2 Configurations
IAM structure
S3 Bucket Structure
Acces Key Token
Secret Key Tokens
API Pentesting Lab Set up (vAPI & CrAPI)
OWASP Top 10 vulnerability for API
Basic Structure & Functionality of API
REST & SOAP based API
S3 Bucket Structure
Acces Key Token
Secret Key Tokens
Information Disclosure
Broken Object Level Authorization
Broken User Authentication
Excessive Data Exposure
Lack of Resources and Rate Limiting
Broken Function Level Authorization
Mass Assignment
Security Misconfigurations
Injections
Improper Assets Management
Business Logic Vulnerabilities
Recon
Endpoint Analysis
FUZZING
Automating Mass Assignment Attacks with Arjun and Burp Suite Intruder
Attacking GraphQL
Introduction of SOC
What is Enterprise network
what is Defense in Depth
What is Log Parsing
Deep Dive into SOC Environment
What are SIEM deployment options
SIEM Architecture
Splunk Introduction
How to upload data to splunk
what is Splunk Field
Understanding web logs
How to Create Splunk Reports and Dashboard
How to install Splunk Forwarder in windows
Get one on one demo class with our industry expert trainers.
Book A Demo Class
Incident Responder, Cloud Security Engineer, Desktop Security Analyst, Security Consultant Security Auditor Firewall Engineer, Ethical Hacker, Storage Security Engineer, Security Test Engineer, Cyber Security Engineer.
DataSpace Academy courses are available at extremely competitive prices. Our Course Fees are structured keeping in mind the convenience and budget of students and beginners
+18% GST
Training & Mentorship
Flexible Schedule
Online Live Interactive Session
Recorded Session After the class
World Recognised Certificate
*EC Council Exam Voucher Included
Enroll into your desired course with DataSpace Academy in 3 easy steps
Select your
desired course
from
our website
Enter your
details and
complete
the payment process
Select a batch for your first class
Soumya Jas is a Web Application Penetration Tester, Bug Bounty Hunter, Blockchain and Python Enthusiast. Additionally, he has an experience in playing CTF games on platforms like Portswigger and HackTheBox. While auditing and securing websites like eBluesoft (https://ebluesoft.com/) he discovered critical vulnerabilities and mitigated those vulnerabilities.
868 Students Taught
CEH Certified, Qualys Guard VM Certification 2019, DevSecOps Trained, DAST & SAST Handling client end to end from taking requirements till providing end report post-false-positive analysis of over 200 applications. Advance Knowledge of professional tools for Network, Source Code Analysis and Web Application Testing. Providing remediations to the clients for the vulnerable issues found during the auditing of the website & Coordinating with the development team for issues closure
209 Students Taught
CEH certified, CCNA essentials, having knowledge in various areas of cybersecurity including Web application penetration testing and network penetration testing. Bug bounty hunter having reported several vulnerabilities in platforms such as Bugcrowd, HackerOne, Integriti and recognized by several organizations. Passionate about information security and cybersecurity in general and looking forward to learn and experience new security aspects in this field.
2986 Students Taught
Vishal is a highly experienced Cybersecurity Professional and Ethical Hacking trainer who has experience in delivering lectures at the Telangana State Police Academy and other Government Universities. Vishal has secured a position among the top 10 finalists at Karnataka State Police Hackathon 2023, Which was a project on OSINT Project. He is also a Bug bounty hunter with skillsets in web penetration, and programming knowledge of C and Python.
2986 Students Taught
Learn from Industry Experts with Years of Expertise in the related field.
Practice on Real Time Projects which can be showcased to future recruiters
Placement Support for successful completion of courses and certification
100% practical and lab-based classes (available online & offline)
Specially tailored Certification Course equipped with in-demand industry skills
The course comes with round-the-clock support for doubt-clearing session
I enrolled in the Job guarantee program in Cybersecurity from DataSpace Academy, and it was one of the best decisions of my life. The program was very well-structured, and the instructors were very knowledgeable and supportive.
DataSpace Academy's Job guarantee program in Cybersecurity is an excellent program for anyone looking to kickstart their career in this field. The job guarantee feature gave me the confidence that I would be able to land a job in this field, and I did just that after completing the program.
I highly recommend DataSpace Academy's Job guarantee program in Cybersecurity. I learned a lot and was able to apply what I learned to real-world situations. The job guarantee feature was also a significant motivator for completing the program.
DataSpace Academy's Job guarantee program in Cybersecurity is top-notch. The program is designed to provide students with the skills and knowledge needed to succeed in the cybersecurity field. The job guarantee feature gave me the peace of mind that I would be able to secure a job in this field, and I did just that after completing the program.
I had an excellent experience with DataSpace Academy's Job guarantee program in Cybersecurity. The program provided me with the necessary skills and knowledge to excel in the cybersecurity field. The job guarantee feature was a significant motivator, and I was able to secure a job in this field shortly after completing the program.
Have a 5-minute call with our experts to get your questions answered.
Everyone aspiring to build a career in cybersecurity is welcome to join the course.
It is good to have the basic computer knowledge to enroll on this course. However, people from non-technical backgrounds can also join this course.
Yes, the program includes live project practice for hands-on training.
For details on seasonal discounts and special offers, please consult with our academic counselling team.
DataSpace Academy provides Internship opportunities and placement assistance based on the merit of the student on successful completion of the course.
The candidate will be able to land a guaranteed job in cybersecurity, pentesting, or data science-based domains.