Rated Online Education
Active Students
Classes Completed
Ongoing Completed
Job guaranteed programme in Cybersecurity from DataSpace Academy is very Thoughtfully designed to achieve the best job roles in the market for this field. This particular course is designed to make an aspirant into a security professional to give a kickstart to your Advanced Career Opportunities.
Basic of computer network
Explain network & types of network
Understand & compare Broad network categories
Understand and Explain OSI Model
Describe 7 layers of OSI
Explain PDU in OSI model
Explain types of networking media
Understand and explain coaxial cables, Twisted pair cables, Fiber optic cables
Understand straight cable & crossover cable
Structured Cabling
Understand networking devices and its use
Understand and Explain Topology and it need
Explain different types of physical topologies used in networking
Understand about ip address
Explain about IP Version 4 classes and Subnet Mask
Configuring and verifying IP Address
Understand and explain about TCP/IP
Compare OSI Model and TCP/IP Model
Explain Layer in TCP/IP Model
Understanding Ports and Protocol
Details of Subnetting
Router Configuration & Firewall Rules
What is VPN and How it's Work
Understanding Web Application Structure
Detailed in Html Request And Response
Linux Basic Commands
Introduction To Cloud Computing
Cloud Computing Models
Benefits Of Cloud Computing
Private Cloud
Hybrid Cloud
Software As A Service (SAAS)
Platform As A Service(PAAS)
Infrastructure As A Service (IAAS)
Introduction to Ethical Hacking
Lab Setup
Steps of Ethical Hacking
Google Hacking Using Dorks Demo
What is Nmap
Port and Service Scanning with Nmap
Nmap Various Command
Network Scanning using Nmap
Network Vulnerability Scanning using Nessus
Making Report After Successful Scan
What is Metasploit
Exploit using Metasploit
Windows 7 Hacking using Zero-Day
Windows 10 Hacking using msfvenom
Android Hacking using msfvenom
Wireshark
How to intercept Login details from network using Wireshark
Denial of Service Attack
Wifi Password Hacking using aircrack-ng
How to secure Wifi Network
Web Application Testing Methodology
OWASP Top 10 -2022
What is Sql Injection vulnerability
Types of Sql Injection
Sql-Injection Exploit using Sqlmap
Business impact of Sql Injection vulnerability
How to Resolve the issue from application
What is XSS vulnerability
Types of Cross-site Scripting vulnerability
Demonstration of XSS
How to Resolve the issue from application
Directory Listing Vulnerability
Demonstration of Directory Listing vulnerability
What is Data Tampering vulnerability
Demonstration of Data Tampering
File Upload Vulnerbility
What is web shell hacking
Demonstration of this vulnerability
Cross Site Request Forgery
Demonstration of this vulnerability
Insecure Direct Object Reference
Report Making in Web Application VAPT
Social Engineering Attack
SE toolkit Tutorial
RAT Tutorial
Mobile Device Architecture and common mobile threats
Android Architecture
Reverse Engineering and Static Application Analysis
Best practices and security guidelines for the mobile applications
Intro to PowerShell Scripting
Powershell commends for Pentester
PowerShell with Metasploit Meterpreter
Web Application Basics (Structure, Components)
OWASP Top 10 Vulnerability & Testing Methodology
Burp Suite Advance Usages by installing Plugins
Information Gathering/Recon
Information Gathering/ReconTools Covered- Gobuster, FFUF, WFUZZ, Feroxbuster, gau, Linkfinder, waybackurls, Assetfinder , Subfinder, Amass, httpx,httprobe
Manual Recon : Shodan, whois Lookup, Censys, Nuclei, Arjun Framework
SQL injection vulnerability in WHERE clause allowing retrieval of hidden data
SQL injection vulnerability allowing login bypas
SQL injection UNION attack, determining the number of columns returned by the query
SQL injection UNION attack, finding a column containing text
SQL injection UNION attack, retrieving data from other tables
SQL injection attack, querying the database type and version on Oracle
SQL injection attack, listing the database contents on Oracle
Blind SQL injection with time delays and information retrieval
Blind SQL injection with out-of-band interaction
Reflected XSS into HTML context with nothing encoded
Stored XSS into HTML context with nothing encoded
Reflected XSS into attribute with angle brackets HTML-encoded
Reflected XSS into a JavaScript string with angle brackets HTML encoded
Reflected XSS with some SVG markup allowed
Exploiting XSS to perform CSRF
Reflected DOM XSS
Stored DOM XSS
Basic SSRF against the local server
Basic SSRF against another back-end system
Basic SSRF against the local server
Basic SSRF against another back-end system
SSRF with blacklist-based input filter
SSRF with filter bypass via open redirection vulnerability
Blind SSRF with out-of-band detection
SSRF with whitelist-based input filter
Blind SSRF with Shellshock exploitation
OS command injection, simple case.
Blind OS command injection with time delays
Blind OS command injection with output redirection
Blind OS command injection with out-of-band interaction
Blind OS command injection with out-of-band data exfiltration
File path traversal, traversal sequences blocked with absolute path bypass
File path traversal, traversal sequences stripped non-recursively
File path traversal, traversal sequences stripped with superfluous URL-decode
File path traversal, validation of start of path
File path traversal, validation of file extension with null byte bypass
Username enumeration via different responses
2FA simple bypass
Password reset broken logic
2FA broken logic/p>
Username enumeration via subtly different responses
Username enumeration via response timing
Broken brute-force protection, IP block
Remote code execution via web shell upload.
Web shell upload via Content-Type restriction bypass
Web shell upload via path traversal
Web shell upload via race condition
CORS vulnerability with basic origin reflection.
CORS vulnerability with trusted null origin
CSRF where token validation depends on request method.
CSRF where token validation depends on token being present
CSRF where token is not tied to user session
CSRF where token is duplicated in cookie
No-Rate Limiting
IDOR
Introduction
Mobile Application Testing set up
OWASP Top 10 of Mobile Application Penetration Testing
Apk File Structure
OSINT Framework
Port Exploitation
Privilege Escalation (Windows & Linux)
Persistence
Process Migrations
Latest CVEs Exploitation
Router Exploitation
Firewall Exploitation
AV Evasion
CTF : Kioptrix level 1-3, Magic
Cloud Penetration Testing Lab set up
OWASP Top 10 Vulnerability for Cloud Security
EC2 Configurations
IAM structure
S3 Bucket Structure
Acces Key Token
Secret Key Tokens
API Pentesting Lab Set up (vAPI & CrAPI)
OWASP Top 10 vulnerability for API
Basic Structure & Functionality of API
REST & SOAP based API
S3 Bucket Structure
Acces Key Token
Secret Key Tokens
Information Disclosure
Broken Object Level Authorization
Broken User Authentication
Excessive Data Exposure
Lack of Resources and Rate Limiting
Broken Function Level Authorization
Mass Assignment
Security Misconfigurations
Injections
Improper Assets Management
Business Logic Vulnerabilities
Recon
Endpoint Analysis
FUZZING
Automating Mass Assignment Attacks with Arjun and Burp Suite Intruder
Attacking GraphQL
Introduction of SOC
What is Enterprise network
what is Defense in Depth
What is Log Parsing
Deep Dive into SOC Environment
What are SIEM deployment options
SIEM Architecture
Splunk Introduction
How to upload data to splunk
what is Splunk Field
Understanding web logs
How to Create Splunk Reports and Dashboard
How to install Splunk Forwarder in windows
Get one on one demo class with our industry expert trainers.
Metaspolit
Nitko
Hashcat
NMAP
Incident Responder, Cloud Security Engineer, Desktop Security Analyst, Security Consultant Security Auditor Firewall Engineer, Ethical Hacker, Storage Security Engineer, Security Test Engineer, Cyber Security Engineer.
Soumya Jas is a Web Application Penetration Tester, Bug Bounty Hunter, Blockchain and Python Enthusiast. Additionally, he has an experience in playing CTF games on platforms like Portswigger and HackTheBox. While auditing and securing websites like eBluesoft (https://ebluesoft.com/) he discovered critical vulnerabilities and mitigated those vulnerabilities.
868 Students Taught
IT expert Soumya Maity has more than 2.5+ years of experience in the field of Hardware & Network troubleshooting. Also he has experienced in AWS.
2986 Students Taught
CEH Certified, Qualys Guard VM Certification 2019, DevSecOps Trained, DAST & SAST Handling client end to end from taking requirements till providing end report post-false-positive analysis of over 200 applications. Advance Knowledge of professional tools for Network, Source Code Analysis and Web Application Testing. Providing remediations to the clients for the vulnerable issues found during the auditing of the website & Coordinating with the development team for issues closure
209 Students Taught
DataSpace Academy’s courses are the best deal that you can find in the market. Our Course Fees are structured keeping in mind all kinds of feasibilities for students and professionals.
+18% GST
Training & Mentorship
Flexible Schedule
Online Live Interactive Session
Recorded Session After the class
World Recognised Certificate
3 Months Internship Program after the course
*No cost EMI options are available.
Enroll your desired course and join DataSpace Academy in just few clicks!
Select your desired course
from
our website
Enter your details and
complete
the payment process
Select a batch for your first class
I am pleased to share that I have enrolled in the certification in cybersecurity course which is proving to be a great learning experience. The instructors are experts in their field, and the course is well-structured to provide us with the skills they need to combat cybersecurity threats. The practical exercises and simulations are particularly helpful in applying the concepts learned in class, and the peer community is a valuable resource for exchanging ideas and feedback.
Hello, My name is Somnath, I have recently completed the Certification in Cyber Forensics course from DataSpace Academy, and I must say that the course has exceeded my expectations. The instructors are engaging and knowledgeable, and the course content is relevant and up-to-date. The practical exercises and simulations have been invaluable in applying the concepts learned, and the community of peers has been supportive and helpful throughout the course. Also, since I have always been inquisitive in nature, I got all-around support as and when possible which has been extremely helpful.
I am enrolled in a Cyber Forensics course, and I am impressed with the quality of the content and the level of engagement from the instructors. The course is designed to provide students with the practical skills and knowledge necessary to tackle cybersecurity threats, and the practical exercises and simulations have been particularly useful in applying the concepts learned. The peer community is also a great resource for sharing ideas and feedback.
I am currently enrolled in a certification course for Cyber Forensics, and I am thoroughly impressed with the depth and breadth of the content covered. The instructors are experienced and knowledgeable, and the course is designed to provide students with the practical skills and knowledge necessary to tackle cybersecurity threats. The hands-on approach has been particularly useful, and the peer community has been supportive and engaging throughout the course. Overall, I would highly recommend this course to anyone interested in cybersecurity.
I highly recommend the DataSpace Academy to anyone looking to pursue a career in digital forensics. The quality of the courses and instructors is exceptional, with comprehensive and up-to-date content that covers a wide range of topics related to cyber forensics. The hands-on approach to learning provides students with practical experience using the latest tools and techniques in the industry. The instructors are experienced professionals who are passionate about their work and always willing to provide guidance and support to students
DataSpace Academy provides a flexible learning environment that allows professionals like us to study at their own pace and on their own schedule, especially because I am a working professional and it has helped me a lot. The online platform is user-friendly and easy to navigate, with a wealth of resources and support available to students at all times. Overall, I am extremely satisfied with my experience with the DataSpace Academy and would highly recommend it to anyone looking to enhance their skills and knowledge in the field of cyber forensics and digital forensics.
Candidate should have a minimum Educational qualification of (10+2) and a basic understanding of computer Applications.
Because India is Asia's IT hub, networking is in high demand. In India, the scope of networking is enormous. Companies such as TCS, Infosys, Wipro, HCL, Tech Mahindra, and others.
In India, the average starting salary for a Cyber Security analyst is roughly around 1.8 lakhs to 2.20 Lakhs per year (15.0k - 18.0k per month).
DataSpace Academy provides an Internship programme for students who have successfully completed the certification and diploma courses. For pre-qualified candidates who are freshers, there will be a course-related test that needs to be qualified to be a part of the internship programme.