About Cyberops Labs

Cyberops Labs is one of the World's leading organization in Information Security

As one of the India’s leading organizations in Information Security, Cyberops have been successful in offering its customers the required products and services over the years. We now aim to expand our spheres globally and out first step towards it being South Africa. Cyberops Labs will now expand in Johannesburg, Durban and Cape Town.
The risk of a proliferate exposure to Cyber Attacks have increased with the ongoing technological advancements and developments in the industry. It has, thus, become quite important to shield the cyberspace and the company aims to efficiently work towards the same. Furthermore, we also levitate to influence our proficiency at a global stage in the field of information security and cyber-crime investigation.
The company also provides certified trainings on Information Security and penetration for security audits along with cyber-crime investigation services within various sectors as per the needs of our customers in South Africa.
The company will also foster certified trainings on Information security and will provide penetration for security audits for its customers in South Africa.

Total Cyber Security Solutions

We strive to digitally shield the cyber world by offering our various products and services like VAPT and cyber-crime consultancy in Johannesburg, Durban and Cape Town in South Africa. Our magnificent team includes highly skilled professionals and expert advisors encasing the digital sphere with secure cyberspace helping to provide even better solutions and relations with our customers.

icon

VAPT

Vulnerability Assessments and Penetration Testing (VAPT) offers the ability to perform security audit and provide recommendations for security disruption.

icon

Cyber Crime Consultancy

Cyberops Labs provides the required assistance in detection of the defects and providing the solutions for the Cybercrime.

icon

Secure Software Development

Data is crucial for organizations and data loss lead to compliance, monetary and reputational loss.

icon

Training

Cyberops Labs also intends to provide trainings and courses relating to security of the cyber world.

Training We Provide

Another path that we are leading to is providing trainings and courses relating to the cyber world motivating people to ensure knowledge and security. Some of the major topics for the trainings and courses will be cyber security and ethical hacking in South Africa especially, Cape Town, Johannesburg and Durban. Our information security companies and experts at these locations will help us deliver our services efficiently.

img

CO-ISA Cyberops Labs InfoSec Analyst

  • Duration: 1 Month
  • Course Level: Basic

Modules to be covered

This session will be an introductory one. It will be brief the participants about the cyber world in South Africa along with cyber security, crime and the threats involved. It will also discuss the terms and terminologies used in the field.

This seminar will conclude the definition of networking and basics of the same. Participants will also learn about data transmission, devices used in the same and ports and protocols. Various types of networks will be discussed with their working model.

This module will define the basic terminologies at the beginning followed by the ways multiple operating systems are installed and configured in virtual box.

The course aims to implement understanding the separation of machines inside the same physical host and their communication with lower hardware levels. One will also learn about working of virtualization technology and the base for further modules in the course like web application hacking, malware analysis.

The module gives an insight of OSI definition, its methods and techniques i.e. various ways to collect information from publically available resources like e-Mail spoofing and tracing fake mail.

Module will also focus on the knowledge about advance search techniques in various search engines. Introduction to social engineering techniques like phishing for email id hacking, desktop phishing, remote phishing and their importance in information gathering will also be a prominent part of the module.

One knows the prominence about data security and the reason it needs to be encrypted. The module begins with introduction of cryptography from its origin to traditional methods and modern techniques. It further demonstrates the application of cryptography in information security and data protection techniques. Later, it also describes the basic concepts of cryptography including secret key and public key systems, encoding and decoding. It also discusses the difference between encryption and encoding along with techniques and methods of decryption

This section will provide the basic definition of malware and the basic terminologies and concepts involved. It will also give an insight of methods used to remove virus from system.

Participants will be briefed about creating Malware and various types of malware (virus, worms, Trojans, key loggers etc.)

The participants are taught basic fundamentals of web application incorporating certain client side and server side scripting and possible web application attacks like SQL Injection, cross site scripting, local file inclusions and remote file inclusions and also medium level attacks like click jacking etc.

Introductory knowledge of database and working with database using SQL queries along with installation and working for local servers will also be a major part of the module along with an introduction to basic working of HTTP with request and host examples.

The most important part of the cyber- crime is the evidence which is involved in almost every case in the manner of phone, smart phones, computer etc.

The module will cover basics of forensics and Introduction to basic concept of data recovery from different types of storage devices.

The final session will discuss the various cyber- crime cases handled by Cyberops Labs along with investigation procedure which will lead to the methods and solutions required during the investigation of a cyber- crime case. Also, Indian IT act with reference to case studies from Cyberops Labs will be discussed.

img

Who should attend?

Course is designed to address the needs of :

  • The individuals who yearn to explore the spheres of cyber security, the threats involved and the countermeasures.
  • Non – Technical professionals who are aiming for prospective career opportunities in cyber security or a similar environment in future.
  • Technical background students who aim for advanced learning in cyber security field as this will help them to understand the basic concepts and terms of cyber world they are willing to work in.

Recommendation :

Course provides the basic and fundamental knowledge about information security. Designed for participants having basic knowledge of computers and technology, it further enables them to grasp these fundamentals that serve as the foundation for InfoSec skills and knowledge. Thus, it is highly recommended to:

  • School students, Parents, Teachers, Professors and individuals who aim to understand the cyber security aspects.
  • Individuals working in a data audit, policy enforcement, or network intrusion investigation role.

Pre-Requisite :

Participants should have basic knowledge of computing and internet surfing.

img

Course Package includes :

  • Cyberops Labs Welcome Kit
  • Advanced Software Toolkit
  • Practical exposure on getting hands-on experience at our well-equipped labs.

Learning from the course :

The course offers its participants learning of the basic concepts and fundaments of Information Security and Networking in South Africa. It also includes the methods for operating multiple systems on a single hardware and analyzing networks for attacks and detecting loopholes in the system.

The span of course also covers cryptography, metasploit, digital forensic terminologies and data recovery methods. Finally, the course will conclude with cyber- crime investigation that will incorporate various cyber- crime cases and modus operandi of criminals in Johannesburg, Cape Town and Durban.

img

Certification: :

The practical exam after the course is entitled for certification aiming at how participants portray skills, expertise and knowledge gained throughout course to detect possible attacks and methods to penetrate. Hence, the candidates are required to clear the set performance criteria for certification and gaining specialization in the modules covered.

Requirements :

We use Simulation test method to provide real time challenge where participants portray skills acquired during the entire course.

  • Passing Criteria: 80% and above
  • Duration of test: 5 hrs
img

Performance Give outs :

Participant securing best Score will be awarded with an award of performance Excellency – CAPE Medal and certification of Merit. Participants scoring 80% and above will be awarded with Certification of Merit.

Terms & Conditions :

  • No. of attempts : Two
  • Verification method for certification : The certificate will incorporate a unique ID for every participant which can also be used for verification from Our Website.
Read More
img

CO-ISE Cyberops Labs InfoSec Expert

  • Duration: 2 Months
  • Course Level: Intermediate

Modules to be covered

This introductory module considers the fundamentals of internet and its primary concepts from origin to the current trending concepts of information security world. The course offers a basic knowledge of security concepts and its principles for the beginners. The major intent of the module is to clear misbelieves and myths of cyber world and also to study recent trends, threats and modus operandi of cyber criminals and testers.

Networks constitute a mechanism of information that travels across multiple devices using various mediums, concepts of Domain name system, Servers, Connection mechanism. This module will focus on the detailed knowledge of OSI model and TCP/IP model, data transmission and various Protocols used at each layer with focus on Networking Layers, Network design and implementation and the devices used for the same.

This module will define the basic terminologies at the beginning followed by the ways multiple operating systems are installed and configured in virtual box.

The course aims to implement understanding the separation of machines inside the same physical host and their communication with lower hardware levels. One will also learn about working of virtualization technology and the base for further modules in the course like web application hacking, malware analysis.

The module gives an insight of OSI definition, its methods and techniques i.e. various ways to collect information from publically available resources like e-Mail spoofing and tracing fake mail.

Module will also focus on the knowledge about advance search techniques in various search engines. Introduction to social engineering techniques like phishing for email id hacking, desktop phishing, remote phishing and their importance in information gathering will also be a prominent part of the module.

One knows the prominence about data security and the reason it needs to be encrypted. The module begins with introduction of cryptography from its origin to traditional methods and modern techniques. It further demonstrates the application of cryptography in information security and data protection techniques. Later, it also describes the basic concepts of cryptography including secret key and public key systems, encoding and decoding. It also discusses the difference between encryption and encoding along with techniques and methods of decryption.

This module discusses the loopholes in protected Wi-Fi networks and its testing. Students will learn to test the security of a protected Wi-Fi network. The later phase of the module includes demonstration of internal network attacks such as sniffing, MITM, DNS cache poisoning. Also, it will give an introduction of misconfigurations and loopholes in router security.

This section will provide the basic definition of malware and the basic terminologies and concepts involved. It will also give an insight of methods used to remove virus from system.

Participants will be briefed about creating Malware and various types of malware (virus, worms, Trojans, key loggers etc.)

The participants are taught basic fundamentals of web application incorporating certain client side and server side scripting and possible web application attacks like SQL Injection, cross site scripting, local file inclusions and remote file inclusions and also medium level attacks like click jacking etc.

Introductory knowledge of database and working with database using SQL queries along with installation and working for local servers will also be a major part of the module along with an introduction to basic working of HTTP with request and host examples.

Metasploit is a framework which allows a security tester to arrange their exploits and launch them easily. The module gives a detailed study about the same along with the ways metasploit covers different types of pre build exploits. The module also covers exploitation techniques for different types of systems like windows, android, MAC.

The most important part of the cyber- crime is the evidence which is involved in almost every case in the manner of phone, smart phones, computer etc.

The module will cover basics of forensics and Introduction to basic concept of data recovery from different types of storage devices.

The final session will discuss the various cyber- crime cases handled by Cyberops Labs along with investigation procedure which will lead to the methods and solutions required during the investigation of a cyber- crime case. Also, Indian IT act with reference to case studies from Cyberops Labs will be discussed.

img

Who should attend?

Course is designed to address the needs of :

  • Those individuals who intend to explore the threats and countermeasures associated with cyber security field and are new to terminologies and concept of the same.
  • Non – Technical participants planning a prospective career in cyber security.
  • Chartered accountants dealing in information security.
  • Technical background students looking forward to an advanced learning in cyber security field helping them to understand the basic concepts and terms of cyber world.
  • The course is designed for all industry spectrums & professionals who want to acquaint with the basics of concepts, terminologies of information security, networking, cryptography and all that aspects that frame the underlying concepts of cyber security and countermeasures.

Recommendation :

Participants learn the fundamentals of information security concepts already having the basic knowledge of computers and technology serving as the foundation for InfoSec skills and knowledge. The course exhibits the basics to core terminology through the syllabus. Thus the Course is highly recommended to:

  • School students, parents, Teachers, Professors and individuals who aim to understand the cyber security aspects
  • Corporate and government/ investigators and network security personnel.
  • Individuals working in a data audit, policy enforcement, or network intrusion investigation role.

Pre-Requisite:

Participants should have basic knowledge of computer system and internet surfing.

img

Course Package includes :

  • Cyberops Labs Welcome Kit
  • Advanced Software Toolkit
  • Remote access to test beds for two weeks.

Learning from the course :

The Course is designed to build an understanding of the security terminology in South Africa. The participants learn to design and implement networking devices incorporating the importance of their security. The module includes various security technologies, including anti-malware, firewalls, and intrusion detection systems giving a fair idea of how cryptography applies complex mathematics and logic to design strong encryption methods. The participants in Durban, Johannesburg and Cape Town will also learn about the exploitation techniques and capabilities for penetration testing in the systems useful for both business and legal audiences. The final sessions of the course will further discuss Cyber- crime investigation and will give an insight on various cyber- crime cases and criminal modus operandi and live cases handling for real time experiencing.

img

Certification :

The participants get a chance to exhibit their skills acquired during the learning of the course through a practical examination where they detect possible attacks and methods to penetrate making them a specialized in the module. They are further entitled to a certification if cleared a set score.

Requirements :

We use Simulation test method to provide real time challenge which will help participants to use the gained skills, expertise and knowledge acquired during the entire course.

  • Passing Criteria: 80% and above
  • Duration of test: 5 hrs
img

Performance Give outs :

Participant with highest Score in batch will be awarded with Cyberops Labs award of performance Excellency – CAPE Medal and certification of Merit.

Participants scoring 80% and above will be awarded with Certification of Merit.

Terms & Conditions :

  • No. of attempts : Two
  • Verification method for certification : The certificate will incorporate a unique ID for every participant and the same can be used for verification from Our Website.
Read More
img

CO-ISS Cyberops Labs InfoSec Specialist

  • Duration: 2.5 Months
  • Course Level: Advance

Modules to be covered

This introductory module considers the fundamentals of internet and its primary concepts from origin to the current trending concepts of information security world. The course offers a basic knowledge of security concepts and its principles for the beginners. The major intent of the module is to clear misbelieves and myths of cyber world and also to study recent trends, threats and modus operandi of cyber criminals and testers.

Networks constitute a mechanism of information that travels across multiple devices using various mediums, concepts of Domain name system, Servers, Connection mechanism. This module will focus on the detailed knowledge of OSI model and TCP/IP model, data transmission and various Protocols used at each layer with focus on Networking Layers, Network design and implementation and the devices used for the same.

This module will define the basic terminologies at the beginning followed by the ways multiple operating systems are installed and configured in virtual box.

The course aims to implement understanding the separation of machines inside the same physical host and their communication with lower hardware levels. One will also learn about working of virtualization technology and the base for further modules in the course like web application hacking, malware analysis.

Open Source intelligence (OSI) is focused on collecting as much information as possible about a target which can be organization, a person, website or a specific system.

The participants further learn about its methods and techniques i.e. various ways to collect information from publically available resources like e-Mail spoofing and tracing fake mail.

Module will also focus on the knowledge about advance search techniques in various search engines. Introduction to social engineering techniques like phishing for email id hacking, desktop phishing, remote phishing and their importance in information gathering will also be a prominent part of the module.

One knows the prominence about data security and the reason it needs to be encrypted. The module begins with introduction of cryptography from its origin to traditional methods and modern techniques. It further demonstrates the application of cryptography in information security and data protection techniques. Later, it also describes the basic concepts of cryptography including secret key and public key systems, encoding and decoding. It also discusses the difference between encryption and encoding along with techniques and methods of decryption.

This module discusses the loopholes in protected Wi-Fi networks and its testing. Students will learn to test the security of a protected Wi-Fi network. The later phase of the module includes demonstration of internal network attacks such as sniffing, MITM, DNS cache poisoning. Also, it will give an introduction of misconfigurations and loopholes in router security.

This section will provide the basic definition of malware and the basic terminologies and concepts involved. It will also give an insight of methods used to remove virus from system.

Participants will also be briefed about creating Malware and various types of malware (virus, worms, Trojans, key loggers, etc.) along with the concepts of antivirus and their working along with it techniques to identify Malwares which are not detected by AVs will also be taught.

The participants are taught basic fundamentals of web application incorporating certain client side and server side scripting and possible web application attacks like SQL Injection, cross site scripting, local file inclusions and remote file inclusions and also medium level attacks like click jacking etc.

Introductory knowledge of database and working with database using SQL queries along with installation and working for local servers will also be a major part of the module along with an introduction to basic working of HTTP with request and host examples.

Advancement in technology has made the mobile devices easier and lot more efficient where majority of the tasks are performed through them in the world. In this module we will be discussing about security issues related to android and its application.

On the completion of this module, students will be able to perform reverse engineering on android applications, rooting android devices and testing for the securities and permissions.

Metasploit is a framework which allows a security tester to arrange their exploits and launch them easily. The module gives a detailed study about the same along with the ways metasploit covers different types of pre build exploits. The module also covers exploitation techniques for different types of systems like windows, android, MAC.

The most important part of the cyber- crime is the evidence which is involved in almost every case in the manner of phone, smart phones, computer etc.

The module will cover basics of forensics and Introduction to basic concept of data recovery from different types of storage devices.

In this module basic C and Python language will be discussed with students. This module will also cover the techniques used by testers to create exploits.

In the end, participants will be able to create their own exploits using Buffer Overflow vulnerabilities.

The final session will discuss the various cyber- crime cases handled by Cyberops Labs along with investigation procedure which will lead to the methods and solutions required during the investigation of a cyber- crime case. Also, Indian IT act with reference to case studies from Cyberops Labs will be discussed.

img

Who should attend?

This course caters to the needs of :

  • Participants from Computer engineering background, Students pursuing their bachelors or master’s degree in the same.
  • Professionals working in information security domain and web development domain.
  • Chartered accountants dealing in information security.
  • Individuals planning work with law enforcement in near future.
  • Government officials of IT sector, officials from law enforcement agencies of South Africa including police officials, intelligence bureau, military intelligence, national investigating agency etc.

Recommendation :

Course is suitable for those who are looking forward to get a foothold in information security world of South Africa and joining all the vast field of Web Penetration Testing as a profession or an individual aiming to explore new career opportunities. This is the most intensive course offered by Cyberops Labs training which provides a unique prospective into the intricate world of information and Cyber security in South Africa. Thus, the Course is highly recommended to:

  • Corporate and government/ investigators and network security personnel.
  • Individuals working in a data audit, policy enforcement, or network intrusion investigation role.
  • Professionals who are looking for prospective career opportunities in cyber security field.
  • Law enforcement officers, computer forensic examiners, corporate and private investigators, and network security personnel.

Pre-Requisite :

Technical Participants should have basic knowledge of computer programming languages such as C /C++, PHP/ASP, HTML and web development.

img

Course Package includes :

  • Cyberops Labs Welcome Kit
  • Advanced Software Toolkit
  • Remote access to test beds for practice till the exam.
  • Challenges of penetration testing.

Learning from the course :

The Course enables the participants in Johannesburg, Durban and Cape Town to design, implement, and support networked devices helping them cater the growing demand for network security professionals having skills and knowledge about the advanced concepts and encryptions with various cryptography methods. It also includes techniques and methods to detect malicious program and understand the ground lying principle of reverse engineering malicious software and strategies to assess the security posture of multiple web applications. The module requires participants to conduct an in-depth analysis of android file system for security assessment with reverse engineering tools for android applications. Performing regulatory or compliance requirements that mandate regular penetration testing and vulnerability assessments are also an essential part of the syllabus.

The course helps to discover essential computer / digital forensic tools and techniques for investigation of an incident using forensic skills to handle real world incidents in South Africa. One also understands the process of exploit development with C and python language and creates and customizes exploits for penetration testing and vulnerabilities. Cyber- crime investigation will give an insight on various cyber- crime cases and criminal modus operandi and live cases handling for real time experiencing in the given locations.

img

Certification :

The entire program covers basic outline of cyber security in South Africa including the mannerism of attacks performed, its detection, prevention and solution. Thus, the practical exam after the course is entitled for certification aiming at how participants use skills, expertise and knowledge gained throughout the module. Thus, to specialize the module, candidates are required to clear the set performance criteria for certification.

Requirements :

We use Simulation test method to provide real time challenge which will help participants to use skills, expertise and knowledge acquired during the entire course.

  • Passing Criteria: 80% and above
  • Duration of test: 5 hrs
img

Excellence Award :

Participant with highest score in batch will be awarded with Cyberops Labs award of performance Excellency – CAPE Medal and certification of Merit.

Terms & Conditions :

  • No. of attempts : Two
  • Verification method for certification : The certificate will incorporate a unique ID for every participant and the same can be used for verification from Our Website.
Read More
img

CO-APE Cyberops Labs Android Pentest Expert

  • Duration: 2.5 Months
  • Course Level: Advance

Modules to be covered

The Module is designed to give an introduction of various operating systems like Windows, Linux, iOS and Android and majorly concentrating Android Application penetration testing and development. The course offers a complete knowledge of basic working of smartphones and Linux, principles and the key terms associated with Android operating system for the beginners.

The module will convey an in depth analysis of computer networks and its importance. The basic tasks including connecting the network, monitoring it (including connection changes), and giving users control over an app's network usage will cover a major part of the syllabus. It will also teach parsing and consuming XML data, choosing an HTTP client and performing network operations outside of the UI thread.

Participants will also get a chance to learn about the various protocols used at various layers along with description of design and implementation methods.

This module aims to implement understanding of the distinction of virtual machines in the same host and their communication with each other. The syllabus also includes working of virtualization technology, rooting the Android Emulator in the device and its working and networking. Installing of G-suite to sync data with Outlook and ARM Packages in the Emulator are also a part of the module.

The basic study of Android app structure through an instant app project in Android Studio 3.0 along with its features, feature modules and feature APKs will cover a major part of this module. The other part of this module introduces Java for android apps. Participants also learn building a simple Android app and creating a new interface for the app that takes certain user input and opens a second screen in the app.

Participants engage in privilege management course on this module where one can remove admin rights from the users to prevent exploitation and cyber- crime along with Android Permission Manager where one can control the permissions on the access after its installation.

It also comprises the introduction to APK Permission Analysis which is proposed due to the mess of privacy leaks and property damages of users.

This part of the module explores the ways of analyzing network traffic data, new ideas for improving app's networking performance, reducing power consumption and Reverse Engineering. Students will also learn ways to unzip edit and zip an android APK.

This section will introduce the participants on getting entire access to everything in the system. This includes tasks such as uninstalling an application forced by the creators or the sellers as well as things that can put Android in an unusable state.

This module includes introduction to OWASP, SQLite data storage, detection of poor authentication and authorization by performing binary attacks against the mobile app while it is in offline mode. Learning about the possible vulnerabilities associated with broken cryptography is also a major part as it can be exploited by an attacker. Types of SQL-injection vulnerabilities and their impact on the android OS is also a part of the syllabus.

This module will help students familiarize with the Open Source framework for Automated Mobile Security Assessment and learn about One Click Report Generation and Security Assessment that helps testing framework in real world to control the data. The module also includes carrying out Automated Security Assessment for Android Applications, learning about the semi-Automatic Dynamic Analyzer and the intent spoofing also includes a major teaching of this module.

This module engages the students in Android SDK/NDK and related tool chains. It also analyses exploits and vulnerabilities to Android as well as discusses jailbreaks and attacks areas of Android applications.

img

Who should attend?

Course is designed to address the needs of :

  • Anyone with Computer engineering background or pursuing BCA/MCA.
  • Ethical Hacking Students.
  • Security Analysts.
  • Law Enforcement Personnel.
  • IT Personnel working in Android Development domain.
  • IT Personnel working in IT-Security domain.

Recommendation :

Being the most intensive course offered by Cyberops Labs, it will provide a unique perspective into the intricate world of information and Cyber security in the country. Thus, the course is highly recommended to:

  • Professionals who are looking for prospective career opportunities in cyber security field in South Africa.
  • This course is most recommended for Security Enthusiasts, IT professionals, and Mobile Application Developers seeking to understand typical mobile application security issues in detail.

Pre-Requisite :

One must have a basic knowledge of programming fundamentals.

One should also have the basic knowledge of programming languages such as Java.

Basic security concepts such as: cryptography, reverse engineering, SQL injections and web tools such as Wire shark and OWASP ZAP (or Burp).

img

Course Package includes :

  • Cyberops Labs Welcome Kit
  • Advanced Software Toolkit
  • Challenges of penetration testing.

Learning from the course :

As the name suggests, this is indeed one of the most exciting yet intense courses on our training programme. The module teaches the understanding and practice of the android mobile applications and its ethical hacking in South Africa. It further includes vivid explanation of the terminologies and their functionality. The well- equipped labs also help for practical and better understanding of different operating systems like windows and Linux. Android app penetration testing, network monitoring on devices, ethical hacking of vulnerable applications created by our trainers, automated tools to complete the task are some more advantages of taking up the course. Majority of doubts on Virtualization, APK File Structure, networking emulator, ARM packages in emulator, Android Application Development Basics, Privilege Management & Escalation, Analyzing and Root Access in Android are also solved by our highly qualified trainers in Johannesburg, Durban and Cape Town.

img

Certification :

The entire program covers basic outline of cyber security as well as methods and techniques of how attacks are performed and possible outcomes of attacks along with the detection and prevention methods for the same in South Africa.

Thus the practical exam after the course is entitled for certification aiming at how participants use skills, expertise and knowledge gained throughout course to detect possible attacks and methods to penetrate, hence to be specialized for the modules covered candidates are required to clear the set performance criteria for certification.

Requirements :

We use Simulation test method to provide real time challenge which will help participants to use skills, expertise and knowledge acquired during the entire course.

  • Passing Criteria: 80% and above
  • Duration of test: 5 hrs
img

Excellence Award :

Participant with highest score in batch will be awarded with Cyberops Labs award of performance Excellency – CAPE Medal and certification of Merit.

Terms & Conditions :

  • No. of attempts : Two
  • Verification method for certification : The certificate will incorporate a unique ID for every participant and the same can be used for verification from Our Website.
Read More
img

Summer Training Cyberops Labs InfoSec Expert

  • Duration: 2 Months
  • Course Level: Intermediate

Modules to be covered :

This introductory module considers the fundamentals of internet and its primary concepts from origin to the current trending concepts of information security world. The course offers a basic knowledge of security concepts and its principles for the beginners. The major intent of the module is to clear misbelieves and myths of cyber world and also to study recent trends, threats and modus operandi of cyber criminals and testers.

Networks constitute a mechanism of information that travels across multiple devices using various mediums, concepts of Domain name system, Servers, Connection mechanism. This module will focus on the detailed knowledge of OSI model and TCP/IP model, data transmission and various Protocols used at each layer with focus on Networking Layers, Network design and implementation and the devices used for the same.

This module will define the basic terminologies at the beginning followed by the ways multiple operating systems are installed and configured in virtual box.

The course aims to implement understanding the separation of machines inside the same physical host and their communication with lower hardware levels. One will also learn about working of virtualization technology and the base for further modules in the course like web application hacking, malware analysis.

Open Source intelligence (OSI) is focused on collecting as much information as possible about a target which can be organization, a person, website or a specific system.

The participants further learn about its methods and techniques i.e. various ways to collect information from publically available resources like e-Mail spoofing and tracing fake mail.

Module will also focus on the knowledge about advance search techniques in various search engines. Introduction to social engineering techniques like phishing for email id hacking, desktop phishing, remote phishing and their importance in information gathering will also be a prominent part of the module.

One knows the prominence about data security and the reason it needs to be encrypted. The module begins with introduction of cryptography from its origin to traditional methods and modern techniques. It further demonstrates the application of cryptography in information security and data protection techniques. Later, it also describes the basic concepts of cryptography including secret key and public key systems, encoding and decoding. It also discusses the difference between encryption and encoding along with techniques and methods of decryption.

This module discusses the loopholes in protected Wi-Fi networks and its testing. Students will learn to test the security of a protected Wi-Fi network. The later phase of the module includes demonstration of internal network attacks such as sniffing, MITM, DNS cache poisoning. Also, it will give an introduction of misconfigurations and loopholes in router security.

This section will provide the basic definition of malware and the basic terminologies and concepts involved. It will also give an insight of methods used to remove virus from system.

Participants will also be briefed about creating Malware and various types of malware (virus, worms, Trojans, key loggers, etc.) along with the concepts of antivirus and their working along with it techniques to identify Malwares which are not detected by AVs will also be taught.

The participants are taught basic fundamentals of web application incorporating certain client side and server side scripting and possible web application attacks like SQL Injection, cross site scripting, local file inclusions and remote file inclusions and also medium level attacks like click jacking etc.

Introductory knowledge of database and working with database using SQL queries along with installation and working for local servers will also be a major part of the module along with an introduction to basic working of HTTP with request and host examples.

Metasploit is a framework which allows a security tester to arrange their exploits and launch them easily. The module gives a detailed study about the same along with the ways metasploit covers different types of pre build exploits. The module also covers exploitation techniques for different types of systems like windows, android, MAC.

The most important part of the cyber- crime is the evidence which is involved in almost every case in the manner of phone, smart phones, computer etc.

The module will cover basics of forensics and Introduction to basic concept of data recovery from different types of storage devices.

In this module basic C and Python language will be discussed with students. This module will also cover the techniques used by testers to create exploits.

In the end, participants will be able to create their own exploits using Buffer Overflow vulnerabilities

The final session will discuss the various cyber- crime cases handled by Cyberops Labs along with investigation procedure which will lead to the methods and solutions required during the investigation of a cyber- crime case. Also, Indian IT act with reference to case studies from Cyberops Labs will be discussed.

img

Who should attend?

Course is designed to address the needs of :

  • Those who intend to explore cyber security world and are new to its terminologies and concept in Johannesburg, Durban and Cape Town.
  • Technical background students aiming towards advanced in South Africa as this will help them build their bases for advanced concepts and terms of cyber world.
  • The course is designed for professionals willing to acquaint with the basics of concepts, terminologies of information security, networking, cryptography and all that aspects that frame the underlying concepts of cyber security and its countermeasures.

Recommendation :

Providing a theoretical as well as practical knowledge on information security, this course will help participants acquire vital skills for knowledge of information security in South Africa and working knowledge in cyber invasion security countermeasures. Thus, the course is highly recommended to:

  • College students who aim to understand the cyber security aspects.
  • Corporate and government/ investigators and network security personnel.
  • Individuals working in a data audit, policy enforcement, or network intrusion investigation role.

Pre-Requisite:

Participants should have basic knowledge of computer system and internet surfing.

img

Course Package includes :

  • Cyberops Labs Welcome Kit
  • Advanced Software Toolkit
  • Remote access to test beds for two weeks
  • Research project for students

Learning from the course :

The Course offers its participants a better knowledge of security terminologies in South Africa. The trainings are planned to take place in Johannesburg, Cape Town and Durban and will encourage participants to learn to design, implement, and support networked devices which will help them to understand how information and network security support cyber security and along with the installation of virtual servers and workstations. Participants will learn about various terms associated to the cyber world and its security such as anti- malware, cryptography, OSI and many more throughout the module.

The course will end with Cyber- crime investigation will give an insight on various cybercrime cases held with us and criminal modus operandi with the live cases handling for real-time experiencing in South Africa.

img

Certification :

The entire program covers basic outline of cyber security in South Africa including the mannerism of attacks performed, its detection, prevention and solution. Thus, the practical exam after the course is entitled for certification aiming at how participants use skills, expertise and knowledge gained throughout the module. Thus, to specialize the module, candidates are required to clear the set performance criteria for certification.

Requirements :

We use Simulation test method to provide real time challenge which will help participants to use skills, expertise and knowledge acquired during the entire course.

  • Passing Criteria:: 80% and above
  • Duration of test: 5 hrs
img

Performance Give outs :

Participant with highest score in batch will be awarded with Cyberops Labs award of performance Excellency – CAPE Medal and certification of Merit.

Participants scoring 80% and above will be awarded with Certification of Merit.

Terms & Conditions :

  • No. of attempts : Two
  • Verification method for certification : The certificate will incorporate a unique ID for every participant and the same can be used for verification from Our Website.
Read More

Vulnerability Assessment and Penetration Testing

“It is great to secure your system before the cyber security breach strikes at any time”

Out of many, our most enduring services include Vulnerability Assessments and Penetration Testing (VAPT) that offers the ability to perform security audits and provide recommendations for security disruption in the system. This involves monitoring security for risks involved followed by forensics and penetration testing to cure the problem in the best way possible. The main cities covered in our services are Cape Town, Johannesburg and Durban in South Africa.

The company will provide services for VAPT in South Africa, VAPT in Johannesburg, VAPT in Durban, VAPT in Cape Town.

What is Vulnerability Assessment and Penetration Testing?

  • VULNERABILITY ASSESSMENT

    the assessment carries out an intensive scanning of the security validations which helps in locating the likely flaws in the system. However, the assessment does not reveal the level of impact or destruction caused by the flaws.

  • PENETRATION TESTING

    The penetration testing discovers that one particular flaw out of all radiating to the maximum level of destruction in the system. This method helps exploit the analyzed vulnerabilities manually or using various tools.

  • VULNERABILITY ASSESSMENT AND PENETRATION TESTING (VA/PT)

    Hence, the programme VAPT is a combination of both VA & PT, which not only identifies the flaws in the system but also measures the intensity of each of it. VAPT helps classify the nature of the risk involved and creates an alarming situation before any explosion. This also results in providing the best solution within time.

*Vulnerability: A flaw or weakness in system security procedures, design, implementation, or internal controls that may result in a security breach or a violation of the system’s security policy.

SOLUTIONS WE PROVIDE

  • icon

    Web Application VAPT

  • icon

    Network VAPT

  • icon

    Mobile Application VAPT

VAPT Roadmap

img
img
img

Clientele

logo

Indian Airforce

logo

Indian Army

logo

National Security Guard

logo

CRPF

logo

BPRD

logo

Delhi Police

logo

MP Police

logo

Rajasthan Police

logo

SVPNPA Hyderabad

logo

IIT Jodhpur

logo

NIT Trichi

logo

Chandigarh University

Our Offices

South Africa Office:

624 Louis botha ave Bramley, Johannesburg, South Africa

icon 0114401621 | 0828278676

icon 0865717104 Fax

India Office:

1-A Vishveshwarya Nagar, Gopalpura Bypass,
Jaipur-302018, Rajasthan, India

icon +91 9116117170 | 0141-2763411 | +91 9772200143

Contact Us

Leave us a message and our representative will get in touch with you shortly.