0% found this document useful (0 votes)
388 views

DCSC Topics

The document outlines the curriculum for DROP's Certified Security Course (DCSC). The 4-month course covers topics such as introduction to ethical hacking, networking fundamentals, Linux, footprinting, scanning networks, vulnerability analysis, website hacking, system hacking, Android device hacking, wireless hacking, digital forensics, and web penetration testing. Students will receive a hard copy ISO verified certificate upon completion, as well as opportunities for job or freelance work. Classes will be conducted live online, with the goal of providing career guidance and income sources.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
388 views

DCSC Topics

The document outlines the curriculum for DROP's Certified Security Course (DCSC). The 4-month course covers topics such as introduction to ethical hacking, networking fundamentals, Linux, footprinting, scanning networks, vulnerability analysis, website hacking, system hacking, Android device hacking, wireless hacking, digital forensics, and web penetration testing. Students will receive a hard copy ISO verified certificate upon completion, as well as opportunities for job or freelance work. Classes will be conducted live online, with the goal of providing career guidance and income sources.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

DROP ORGANIZATION

DEVELOPMENT & RESEARCH ORGANIZATION PLANNING


With Job Or Free Lance Work

CHIEF EXECUTIVE OFFICER (CEO)


ROSHAN BURNWAL
+91 74774 66951 WWW.DROP.ORG.IN
DROP CERTIFIED SECURITY
COURSE (DCSC)
➢ Introduction to Ethical Hacking
o Linux OS
o Types of Hackers
o Networking
o Ethical Hacking
o What is Bug Bounty
o Black Hat Hacker
➢ Fundamentals of Ethical Hacking
o Information Gathering
o Gaining Access
o Scanning
o Vulnerability
o Exploitation
➢ Starting Out In Cyber Sec
o Offensive Security
o Defensive Security
➢ Networking
o What is Networking?
o Ping (ICMP)
o What is the Internet?
o IP Addresses
o Internet Protocol version 4 | IPV4
o Internet Protocol version 6 | IPV6
o NAT: Network Address Translation
o MAC Addresses
o Protocol in Computer
➢ Introductory Networking
o Traceroute
o The TCP/IP Model
o Ping | Packet Internet Groper
o The OSI Model:
o WHOIS
o CIA Model | Information Security
o Network Topology (Bus, Ring, Star, Mesh, Tree, Hybrid)
➢ Web Fundamentals
o Introduction and objectives
o Finding the server
o Requests
o Responses
o Cookies
➢ Surface Web, Deep Web, Dark Web
➢ Network Security
o Intrusion Detection System (IDS)
o Firewall
o Honeypots
o Intrusion Prevention System (IPS)
➢ Fundamentals of Linux
➢ Foot printing and Information Gathering
o Type of FootPrinting
o Whois Look
o Wappalyzer
o Mirroring Websites
o Google Dork
o Wayback Machine
o Shodan
o Subdomain Enumeration
o Tracer
o CMS Enumeration
o Eavesdropping
o Ping
o Email Tracking
o Google Dork
➢ Scanning Networks
o Types of Network Scanning
o Port scanning
o Network scanning
o Nmap Scanner
➢ Vulnerability Analysis
o Nikto Web Server Scanner
o WpScan
o Nmap Security Scanner
o Vega Vulnerability Scanner
o Acunetix Web Vulnerability Scanner
o OWASP Zed Scanner
o Burp Suite Scanner
➢ Website Hacking
o Cross-Site Scripting (XSS)
o Brute Force
o Command Injection
o Clickjacking
o Server-side request forgery (SSRF)
o SQL Injection
o Cross site request forgery (CSRF)
➢ System Hacking
o Windows Remote Hacking (RAT)
o Bypass Windows Login Password
o Cookie Stealing Attack
o Recover ZIP Files, PDF
o Keylogger System Hacking
o File Extension Spoofer
o USB To System Hacking
o Virus Creating
➢ Android Device Hacking
o Android Remote Hacking
o Android Hacker Keylogger
o Network Scanning
o Android Hacking Termux Course
➢ Hacking Wireless Networks
o What Is WPS
o WIFI Hacking
o WIFI NETCUT | Network Hacking
o WIFI Jamming | WIFI DOSS
o WIFI Hacking | WIFI Phishing
➢ Digital Forensic Image Analysis
➢ POC | Proof of Concept
➢ POC | Piece of Code
➢ WEB PENETRATION Testing
o Server-Side Request Forgery
o Basic SSRF against the local server
o Basic SSRF against another back-end system
o SSRF with blacklist-based input filter
o SSRF with whitelist-based input filter
o Bypassing SSRF filters via open redirection
o Business logic Vulnerabilities
o Excessive trust in client-side controls
o High-level logic vulnerability
o Cross Site Scripting (XSS)?
o How does XSS work?
o XSS proof of concept
o Reflected cross-site scripting
o Stored cross-site scripting
o DOM-based cross-site scripting
o Insecure Direct Object Reference (IDOR)
o Reflected cross-site scripting
o Full Path Disclosure (FPD)
o Dirsearch : Directory Search
o DirBuster : Directory Search
o DIRB: Web Fuzzer
o Local File Inclusion (LFI)
o FTP Exploit Reverse Shell
o VSFTPD v2.3.4 Backdoor Command Execution
o FTP Exploit Metasploit
o OS Command Injection
➢ BotNet | System Hacking
➢ VPN (Virtual Private Network)
➢ Anonymous Identity
➢ TOR Browser
➢ Web RTC Real-Time Communication
➢ Identity System
o Browser Fingerprinting
o User Agent Browser
➢ Location Tracking
OPPORTUNITIES TO YOUR DOORSTEP

• Special Hacker’s Pendrive


• Hard Copy Certificate
• Job or Freelance work

FAQ
Q. HOW THE CLASSES WILL BE CONDUCTED?
A. THE CLASSES WILL BE CONDUCTED LIVE
THROUGH ONLINE MEETING PLATFORM.
Q. WHAT WILL BE THE BENEFIT?
A. CAREER GUIDANCE WITH EARNING SOURCE
Q. WILL I GET CERTIFICATION?
A. A HARDCOPY ISO VERIFIED CERTIFICATION
WILL BE DELIVERED TO YOUR DOOR STEP.
Q. DURATION OF THE COURSE?
A. 4 MONTHS

FOR ANY MORE DETAILS CONTACT:


CEO OF DROP ORGANIZATION
ROSHAN BURNWAL
+91 7477466951
Website: https://www.drop.org.in/
Youtube Channel : https://www.youtube.com/c/DROPOrganization
Instagram : https://www.instagram.com/drop.org.in/

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy