43, Mohamed Sakr Khafaga ST, from Abbas El-Akkad, Cairo

Trainings

CEH v10

  • Introduction to Ethical Hacking
  • Footprinting and reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • Cloud Computing
  • Cryptography

ECSA

  • 1. Penetration Testing Essential Concepts This is an Essential Prerequisite as it helps you to prepares you the ECSA courseware. Serves as a base to build Advanced Pen Testing Concepts
  • 2. Password Cracking Penetration Testing
  • 3. Denial-of-Service Penetration Testing
  • 4. Stolen Laptop, PDAs and Cell Phones Penetration Testing
  • 5. Source Code Penetration Testing
  • 6. Physical Security Penetration Testing
  • 7. Surveillance Camera Penetration Testing
  • 8. VoIP Penetration Testing
  • 9. VPN Penetration Testing
  • 10. Virtual Machine Penetration Testing
  • 11. War Dialing
  • 12. Virus and Trojan Detection
  • 13. Log Management Penetration Testing
  • 14. File Integrity Checking
  • 15. Telecommunication and Broadband Communication Penetration Testing
  • 16. Email Security Penetration Testing
  • 17. Security Patches Penetration Testing
  • 18. Data Leakage Penetration Testing
  • 19. SAP Penetration Testing
  • 20. Standards and Compliance
  • 21. Information System Security Principles
  • 22. Information System Incident Handling and Response
  • 23. Information System Auditing and Certification

CHFI

  • Module 1. Computer Forensics in Today’s World Module
  • Module 2. Computer Forensics Investigation Process
  • Module 3. Understanding Hard Disks and File Systems
  • Module 4. Data Acquisition and Duplication
  • Module 5. Defeating Anti-Forensics Techniques
  • Module 6. Operating System Forensics
  • Module 7. Network Forensics
  • Module 8. Investigating Web Attacks
  • Module 9. Database Forensics
  • Module 10. Cloud Forensics
  • Module 11. Malware Forensics
  • Module 12. Investigating Email Crimes
  • Module 13. Mobile Forensics
  • Module 14. Forensics Report Writing and Presentation

Offensive OSCP

Offensive OSCP

  • Offensive OSCP 1
  • Offensive OSCP 2
  • Offensive OSCP 3
  • Offensive OSCP 4
  • Offensive OSCP 5
  • Offensive OSCP 6
  • Offensive OSCP 7

Offensive OSCP

  • Offensive OSCP 8
  • Offensive OSCP 9
  • Offensive OSCP 10
  • Offensive OSCP 11
  • Offensive OSCP 12
  • Offensive OSCP 13