Overview
This comprehensive course blends penetration testing with digital forensics, equipping students to both attack and investigate systems. Along with ethical hacking topics like social engineering, buffer overflows, and Metasploit, students will learn forensic techniques to trace attacks, recover data, and analyze files. Ideal for those who want dual expertise in both offensive security and forensic investigation.
Our Trainers
Arpit Maheshwari
Arpit Maheshwari is a Security Professional, Trainer, and Public Speaker for several organizations (Null Meet/OWASP Delhi Chapter, Peerlyst/Cyberfrat Delhi Chapter, OpenSource Delhi Chapter, Indohora Galaxy Pvt. Ltd., CMC Ltd. (TCS Subsidiary), Mile2-India, Dalvardhan Systems, KK Modi International - Stratford University, Hidden Pix, KVCH, Mercury Solutions, Innobuzz Solutions, SSDN, Allicient Technologies, etc.).
Modules
Content :
1. Ethical Hacking Introduction
2. Social Engineering
3. Identity Masking
4. Google Dorking
5. Shodan
6. Windows Security Bypass
7. Linux Bypass
8. Buffer Overflow
9. DDoS
10. Web Application Security
11. Metasploit
12. Data Forensics
13. File Forensics
14. Reverse Engineering
Outcomes
y completing this course, students will:
Develop deep skills in ethical hacking and penetration testing.
Learn to bypass security defenses in Windows and Linux environments.
Gain expertise in digital forensics, including data recovery and file analysis.
Acquire hands-on experience with Metasploit, Shodan, and Google Dorking.
Build competence in reverse engineering to analyze threats and malware.
Become capable of both conducting attacks and investigating breaches — a valuable dual skill set.
Contact
Name: Sourabh Singh
Mobile No: 7869424422
