About Cyberops Labs

Cyberops is one of the India’s leading organization in Information Security

Cyberops Labs have been successful in offering it's customers the required products and services over the years. We now aim to expand our spheres globally and out first step towards it being South Africa. Cyberops Labs will now expand in Johannesburg, Durban and Cape Town. with the ongoing developments and advancements in the technology and networking business environment, the risk of a proliferate exposure to Cyber Attacks have also increased. It has become quite important to shield the cyberspace and thus, Cyberops Labs have been efficiently working towards the same. Furthermore, we also levitate to influence our proficiency at a global stage in the field of information security and Cybercrime investigation. We further aim to provide certified trainings on Information Security and provide penetration for security audits and also Cybercrime Investigation services within various sectors as per their needs in South Africa. The company also foster certified trainings on Information security and will provide penetration for security audits for its customers in South Africa and India.

Total Cyber Security Solutions

We strive to digitally shield the cyberspace by offering various products and services like VAPT and Cybercrime consultancy in Johannesburg, Durban and Cape Town in South Africa. Our highly motivated and dedicated team includes highly skilled professionals and expert advisors encasing the digital sphere with secure cyberspace.

icon

VAPT

Vulnerability Assessments and Penetration Testing (VAPT) offers the ability to perform security audit and provide recommendations for security disruption.

icon

Cyber Crime Consultancy

Cyberops Labs provides the required assistance in detection of the defects and providing the solutions for the Cybercrime.

icon

Secure Software Development

Data is crucial for organizations and data loss lead to compliance, monetary and reputational loss.

icon

Training

Cyberops Labs also intends to provide trainings and courses relating to security of the cyber world.

Training We Provide

Learn more today about how Cyberops Labs can be part of your Success

img

CO-ISA CyberOps InfoSec Analyst

  • Duration: 2.5 Months
  • Course Level: Advance

Modules to be covered

This is an introductory session to brief the participants about the cyber world in South Africa. It will cover topics such as essentials used in cyber security and Cybercrime as well as various threats associated with cyber world. Terms and terminologies used in information security will be discussed that will help participants to clear their concepts regarding information security field.

Networks are defined as medium for communication between two or multiple systems, i.e. it constitutes a mechanism of information that travels across multiple devices using various mediums.

This module is designed to understand the basics of networks and how data is transmitted through the same, along with various Ports and Protocols. It also informs about the devices used for the data transmission i.e. hardware associated with networking like switches, router, hub etc along with types of network, internet protocol v4 & v6, ports & protocols, domain name system and its working.

This Module at beginning will define the basic terminologies; give an introduction of operating systems followed by the technical aspects. It includes how multiple operating systems are installed and configured in virtual box.

The course aims to implement understanding of the way virtual machines are separated inside the same physical host and how they communicate with lower hardware levels, working of virtualization technology and components involved and the essentials to setup a lab for further modules in this course like web application hacking, malware analysis.

Open Source Intelligence (OSINT) is focused on collecting as much information as possible about a target which can be organization, a person, website or a specific system.

The Module hence gives an insight of OSINT methods and techniques i.e. various ways to collect information from publically available resources like E-mail spoofing and tracing fake mail by using various methods.

The Module will provide elementary knowledge about advance search techniques in various search engines used by security professionals and cyber criminals. Introduction to social engineering technique like phishing for email id hacking, desktop phishing, remote phishing and how it is essential in information gathering will also be a prominent part of the module.

Data security is essential for protecting information and thus it needs to be encrypted. The module begins with introduction of cryptography from its origin to traditional methods and modern techniques. It further demonstrates the application of cryptography in information security and data protection techniques.

The second half of the module explores and describes the basic concepts of cryptography including secret key and public key systems, encoding and decoding. It also discusses the difference between encryption and encoding along with techniques and methods of decryption.

The course will cover basic terminologies and concept of Malware - definition, why and how it is affecting the network and the system, key tools and techniques of malware attacks.

Students will be briefed about creating malware and various types of malware (Virus, Worms, Trojans, key loggers etc.)

Module will give an insight of methods used to remove virus from system.

The Module includes the basic fundamentals of web application incorporating certain client side and server side scripting and possible web application attacks like SQL Injection, Cross-Site Scripting, Local File Inclusions and Remote File Inclusions and also medium level attacks like Clickjacking etc.

Introductory knowledge of database and working with database using SQL queries along with installation and working for local servers will also be a major part of the module along with an introduction to basic working of HTTP with request and host examples.

Almost every case of Cybercrime involves a very strong element of system based evidence i.e. phone, smart phones or computer etc.

The Module will cover basics of forensics and Introduction to basic concept of data recovery from different types of storage devices.

This final session will include various Cybercrime cases and criminal modus operands. Also, various Cybercrime cases handled by Cyberops Labs along with investigation procedure will be discussed.

Methods to handle Cybercrime cases with Do's and Don’ts of handling Cybercrime cases will be discussed. Indian IT act with reference to case studies from Cyberops Labs will be discussed.

img

Who should attend?

Course is designed to address the needs of :

  • The individuals who yearn to explore the spheres of cyber security in association with the threats and the countermeasures. The study also scouts to the new terminologies and concepts in the field.
  • Non–Technical professionals who are looking for prospective career opportunities in cyber security or a similar environment.
  • Technical background students who aim for advanced learning in cyber security field as this will help them to understand the basic concepts and terms of cyber world.

Recommendation :

Course provides the fundamental knowledge about the concepts of information security. It is designed for participants having basic knowledge of computers and technology enabling them to grasp these fundamentals that will further serve as the foundation for infosec skills and knowledge. The course covers everything from core terminology to basics. Thus, the Course is highly recommended to:

  • School students, Parents, Teachers, Professors and individuals who aim to understand the cyber security aspects.
  • Individuals working in a data audit, policy enforcement, or network intrusion investigation role.

Pre-Requisite :

Participants should have basic knowledge of computer system and internet surfing.

img

Course Package includes :

  • CyberOps Welcome Kit
  • Advanced Software Toolkit
  • Practical exposure on getting hands-on experience at our well-equipped labs.

Learning from the course :

The particular course is designed to help participants understand the basic concepts and fundaments of Information Security and Networking in South Africa. One will further be able to understand the methods required to operate multiple operating systems on a single hardware along with the methods to analyze networks for attacks and detecting loopholes in the network.

The course also gives an idea of functioning of cryptography along with traditional and modern techniques along with the concepts of Metasploit, digital forensic terminologies and data recovery methods. Thus, the course will conclude with Cybercrime investigation that will incorporate various Cybercrime cases and modus operandi of criminals in Johannesburg, Cape Town and Durban.

img

Certification: :

The entire program covers basic outline of cyber security as well as methods and techniques of how attacks are performed and possible outcomes of attacks along with the detection and prevention methods for the same.

Furthermore, the practical exam after the course is entitled for certification aiming at how participants portray skills, expertise and knowledge gained throughout course to detect possible attacks and methods to penetrate. Hence, the candidates are required to clear the set performance criteria for certification and gaining specialization in the modules covered.

Requirements :

We use Simulation Testing to provide real time challenge which will help participants to use skills, expertise and knowledge acquired during the entire course.

  • Passing Criteria: Passing Criteria: 80% and above
  • Duration of test: 5 hrs
img

Performance Give outs :

Participant with highest score in batch will be awarded with Cyberops Labs award of performance Excellency – CAPE Medal and certification of Merit. Participants scoring 80% and above will be awarded with Certification of Merit.

Terms & Conditions :

  • No. of attempts : Two
  • Verification method for certification : The certificate will incorporate a unique ID for every participant and the same can be used for verification from Our Website.
Read More
img

CO-ISE CyberOps InfoSec Expert

  • Duration: 2 Months
  • Course Level: Intermediate

Modules to be covered

The Module is designed to give an introduction to the fundamentals of internet and its primary concepts from origin to the current trending concepts of information security world. For beginners, the course offers a complete knowledge of basic security concepts, principles, and the key terms associated with information security and cyber World. Intend of the module is to clear misbelieves and myths of cyber world and also to study recent trends as well as threats and modus operandi of cyber criminals and testers.

Networks are defined as medium for communication between two or multiple systems, i.e. it constitutes a mechanism of information that travels across multiple devices using various mediums, concepts of Domain name system, Servers, Connection mechanism. The module will cover in depth knowledge of OSI model and TCP/IP model and how data is transmitted through network, along with various Protocols used at each layer with focus on Networking Layers, Network design and implementation and what devices are used for the data transmission i.e. hardware associated with networking like switches, router, hub etc along with types of network, internet protocol v4 & v6, ports & protocols, sub netting concepts, domain name system and its working, Network architecture and standards.

The module at beginning will define the basic terminologies, introduction of operating systems and technical aspects will follow in the later part of module that includes how multiple operating systems are installed and configured in virtual box.

Course aims to implement understanding of how virtual machines are separated inside the same physical host and how they communicate with lower hardware levels, working of virtualization technology and components involved and the essentials to setup a lab for further modules in this course like web application hacking, malware analysis.

Open Source Intelligence (OSI) is focused on collecting as much information as possible about a target which can be organization, a person, website or a specific system.

The module hence gives an insight of OSI methods and techniques i.e. various ways to collect information from publically available resources like e-Mail spoofing and tracing fake mail by using various methods.

The module will provide elementary knowledge about advance search techniques in various search engines used by security professionals and cyber criminals. Introduction to social engineering technique like phishing for email id hacking, desktop phishing, remote phishing and how it is essential in information gathering will also be a prominent part of the module.

For Information protection data security is essential and thus it needs to be encrypted. The module begins with introduction of cryptography from its origin to traditional methods and modern techniques. Cryptography has important applications in information security and data protection techniques.

The second half of the module Explore and describe basic concepts of cryptography including secret key and public key systems, encoding and decoding. Difference between encryption and encoding along with techniques and methods of decryption will be discussed on the module. Furthermore, it will also demonstrate how Hash Values are created using cryptographic hash function by studying hash techniques and also how to crack hash. It will give an introduction to data hiding techniques like steganography and understanding of how cryptography applies complex mathematics and logic to design strong encryption methods.

The module will begin with an introduction of loopholes in protected Wi-Fi networks and its testing. Students will be able to learn how to test the security of a protected Wi-Fi network. The later phase of the module will include demonstration of internal network attacks such as sniffing, MITM, DNS cache poisoning. Introduction of misconfigurations and loopholes in router security are also included in the study.

The course will cover basic terminologies and concept of Malware - definition, why and how it is affecting the network and the system, key tools and techniques of malware attacks. Students will be briefed about creating Malware and various types of malware (virus, worms, Trojans, key loggers etc.)

Concepts of antivirus and their working along with it techniques to identify Malwares which are not detected by AVs will be taught.

A prominent part of the module, this will include introductory knowledge of database and working with database using SQL queries along with installation and working for local servers and also the basic working of HTTP with request and host examples. Basic html, javascript, php, sql are included in this module to make students better understand the loopholes. By the end of this module, students will be able to test for different type of loopholes in web application security.

The module includes the basic fundamentals of web application including some client side and server side scripting and possible web application attacks like SQL Injection, cross site scripting, local file inclusions and remote file inclusions and also medium level attacks like click jacking etc. They will also be able to patch loopholes in web application.

Metasploit is a framework which allows a security tester to arrange their exploits and launch them easily. The module gives a detailed study about the same along with the ways metasploit covers different types of pre build exploits. The module also covers exploitation techniques for different types of systems like windows, android, MAC.

Almost every case of cyber- crime involves a very strong element of system based evidence i.e phone, smart phones and computer etc. The module will cover basics of forensics and Introduction to basic concept of data recovery from different types of storage devices and image creation for any storage device for data recovery.

Clarity on concepts of data like data deletion possibilities of recovery and dependencies for the same is also included in the module.

This session will include various cyber- crime cases and criminal modus operands. Also will be discussed various cyber- crime cases handled by Cyberops Labs along with investigation procedure.

Methods to handle cyber- crime cases and Dos and Don’ts of handling cyber- crime cases will be discussed. Indian IT act with reference to case studies from Cyberops Labs will be discussed.

img

Who should attend?

Course is designed to address the needs of :

  • Those individuals who intend to explore the threats and countermeasures associated with cyber security field and are new to terminologies and concept of the same.
  • Non – Technical professionals who are looking for prospective career opportunities in cyber security.
  • Chartered accountants dealing in information security.
  • Technical background students who aim for advanced learning in cyber security field as this will help them to understand the basic concepts and terms of cyber world.
  • The course is designed for all industry spectrums & professionals who want to acquaint with the basics of concepts, terminologies of information security, networking, cryptography and all that aspects that frame the underlying concepts of cyber security and countermeasures.

Recommendation :

Course provides the fundamental knowledge of information security concepts, designed for participants having basic knowledge of computers and technology which will enable them to grasp the fundamentals of information security that will serve as the foundation for InfoSec skills and knowledge. The course covers everything from basics to core terminology. Thus the Course is highly recommended to:

  • School students, parents, Teachers, Professors and individuals who aim to understand the cyber security aspects
  • Corporate and government/ investigators and network security personnel.
  • Individuals working in a data audit, policy enforcement, or network intrusion investigation role.

Pre-Requisite:

Participants should have basic knowledge of computer system and internet surfing.

img

Course Package includes :

  • Cyberops Welcome Kit
  • Advanced Software Toolkit
  • Remote access to test beds for two weeks.

Learning from the course :

The Course will help Participants to understand the security terminology in South Africa. Participants will learn to design, implement, and support networking devices which will help them to understand how information and network security help in supporting cyber security along with the installation of virtual servers and workstations. The modules will discuss various security technologies, including anti- malware, firewalls, and intrusion detection systems. It will also give a fair idea of how cryptography applies complex mathematics and logic to design strong encryption methods. One will also comprehend the methods to collect information from centralized database system like IP where the site is hosted, server information, mail server information. The participants in Durban, Johannesburg and Cape Town will also learn about the exploitation techniques and capabilities for penetration testing how to conduct investigations to correctly gather analyze and present digital evidence to both business and legal audiences. Course will end with Cyber- crime investigation and will give an insight on various cyber- crime cases and criminal modus operandi and live cases handling for real time experiencing.

img

Certification :

The entire program covers basic outline of cyber security as well as methods and techniques of how attacks are performed and possible outcomes of attacks along with the detection and prevention methods for the same.

Thus the practical exam after the course is entitled for certification aiming at how participants use skills, expertise and knowledge gained throughout course to detect possible attacks and methods to penetrate, hence to be specialized for the modules covered candidates are required to clear the set performance criteria for certification.

Thus the practical exam after the course is entitled for certification aiming at how participants use skills, expertise and knowledge gained throughout course to detect possible attacks and methods to penetrate, hence to be specialized for the modules covered candidates are required to clear the set performance criteria for certification.

Requirements :

We use Simulation test method to provide real time challenge which will help participants to use the gained skills , expertise and knowledge acquired during the entire course.

  • Passing Criteria: 80% and above
  • Duration of test: 5 hrs
img

Performance Give outs :

Participant with highest Score in batch will be awarded with Cyberops Labs award of performance Excellency CAPE Medal and certification of Merit.

Participants scoring 80% and above will be awarded with Certification of Merit.

Terms & Conditions :

  • No. of attempts : Two
  • Verification method for certification : The certificate will incorporate a unique ID for every participant and the same can be used for verification from Our Website.
Read More
img

CO-ISS CyberOps InfoSec Specialist

  • Duration: 2.5 Months
  • Course Level: Advance

Modules to be covered

The Module starts with an introduction to the fundamentals of internet and its primary concepts from origin to the current trending concepts of information security world in South Africa. For beginners course offers a complete knowledge of basic security concepts, principles, and the key terms associated with information security and cyber World in Johannesburg, Cape Town and Durban. Intend of the module is to clear misbelieves and myths of cyber world and also to study recent trends as well as threats and modus operandi of cyber criminals and testers.

Networks are defined as medium for communication between two or multiple systems, i.e. it constitutes a mechanism of information that travels across multiple devices using various mediums, concepts of Domain name system, Servers, Connection mechanism. The module will cover in depth knowledge of OSI model and TCP/IP model and how data is transmitted through network, along with various Protocols used at each layer with focus on Networking Layers, Network design and implementation and what devices are used for the data transmission i.e. hardware associated with networking like switches, router, hub etc. along with types of network, internet protocol v4 & v6, ports & protocols, sub netting concepts, domain name system and its working, Network architecture and standards.

The module at beginning will define the basic terminologies, introduction of operating systems and technical aspects will follow in the later part of module that includes how multiple operating systems are installed and configured in virtual box.

Course aims to implement understanding of how virtual machines are separated inside the same physical host and how they communicate with lower hardware levels, working of virtualization technology and components involved and the essentials to setup a lab for further modules in this course like web application hacking, malware analysis.

Open Source intelligence (OSI) is focused on collecting as much information as possible about a target which can be organization, a person, website or a specific system.

The module is designed to give an insight of OSI methods and its techniques i.e. various ways to collect information from publically available resources such as e-Mail spoofing, fake mail tracing by using various methods.

The module will then provide elementary knowledge about advanced search techniques in various search engines used by security professionals and cyber criminals. This will be further followed by introduction to social engineering techniques like phishing for email id hacking, desktop phishing, remote phishing and how they are essential in information gathering.

Data security is essential and needs to be encrypted. Thus, the module begins with introduction of cryptography from its origin to traditional methods and modern techniques. Cryptography has important applications in information security and data protection techniques.

The module later explores and describes the basic concepts of cryptography including secret key and public key systems, encoding and decoding. Difference between encryption and encoding along with techniques and methods of decryption also demonstrate how Hash Values are created using cryptographic hash function by studying hash techniques and also how to crack hash. Introduction to data hiding techniques like steganography along with understanding of how cryptography applies complex mathematics and logic to design strong encryption methods is also taught.

The module will begin with an introduction of loopholes in protected Wi-Fi networks and its testing. Students will be able to learn testing security of a protected Wi-Fi network. In the later phase, the module will include practical demonstration of internal network attacks like sniffing, MITM, DNS cache poisoning.

Module will also incorporate introduction of misconfigurations and loopholes in router security along with various internal security concepts like firewalls, IDS and IDPS. Module will later cover scanning networks for live systems and their open ports as well as operating system, finger printing and grabbing banners of running services on remote system. It will also give insight on scanning of known vulnerabilities

The course will cover basic terminologies and concept of Malware - definition, why and how it is affecting the network and the system, key tools and techniques of malware attacks. Students will be briefed about creating Malware and various types of malware (virus, worms, Trojans, key loggers etc. )

Concepts of antivirus and their working along with it techniques to identify Malwares which are not detected by AVs will also be taught.

The module starts with an introductory knowledge of database and working with database using SQL queries along with installation and working for local servers followed by basic working of HTTP with request and host examples. Basic html, javascript, php, sql are included in this module to make students better understand the loopholes. By the end of this module, students will be able to test for different type of loopholes in web application security in South Africa.

The module includes the basic fundamentals of web application including both client and server side scripting and possible web application attacks like SQL Injection, cross site scripting, local file inclusions and remote file inclusions and also medium level attacks like click jacking etc. They will also be able to patch loopholes in web application.

Advancement in technology has brought the world to a phase where most of the operations are performed using mobile devices. In this module we will be discussing about security issues related to android and its application.

On the completion of this module, students will be able to perform reverse engineering on android applications, rooting android devices and testing for the securities and permissions.

Metasploit is a framework which allows a security tester to arrange their exploits and launch them easily and the way it covers different types of pre build exploits. The module also covers exploitation techniques for different types of systems like windows, android, MAC.

Almost every case of cyber-crime involves a very strong element of system based evidence such as phones, smart phones, computers, etc. The module will teach the participants the basics of forensics and introduction to basic concept of data recovery from different types of storage devices and image creation for any storage device for data recovery.

It will further also give clarity on concepts of data like data deletion possibilities of recovery and dependencies for the same.

In this module basic C and Python language will be discussed with students. This module will also cover the techniques used by testers to create exploits.

In the end, participants will be able to create their own exploits using Buffer Overflow vulnerabilities

This final session will include various cyber-crime cases and criminal modus operands where the cases solved by Cyberops Labs will also be discussed.

Methods to handle cyber-crime cases and the Do’s and Don’ts of handling them will be discussed. Indian IT act with reference to case studies from Cyberops Labs will be discussed with the students in Johannesburg, Cape Town and Durban.

img

Who should attend?

This course caters to the needs of :

  • Participants from Computer engineering background, Students pursuing BCA/MCA.
  • Professionals working in information security domain and web development domain.
  • Chartered accountants dealing in information security.
  • Individuals who aim to work with law enforcement and learn how to design an incident response strategy.
  • Government officials of IT sector, officials from law enforcement agencies of South Africa including police officials, intelligence bureau, military intelligence, national investigating agency etc.

Recommendation :

Course is suitable for those who are looking forward to get a foothold in information security in South Africa and join the vast field of Web Penetration Testing as a profession or aim to explore new career opportunities. This is the most intensive course offered by Cyberops Labs training which provides a unique prospective into the intricate world of information and Cyber security in South Africa. Thus, the Course is highly recommended to:

  • Corporate and government/ investigators and network security personnel.
  • Individuals working in a data audit, policy enforcement, or network intrusion investigation role.
  • Professionals who are looking for prospective career opportunities in cyber security field.
  • Law enforcement officers, computer forensic examiners, corporate and private investigators, and network security personnel.

Pre-Requisite :

Technical Participants should have basic knowledge of programming languages such as C /C++ and web development, programming language like PHP/ASP, HTML.

img

Course Package includes :

  • Cyberops Labs Welcome Kit
  • Advanced Software Toolkit
  • Remote access to test beds for practice till the exam.
  • Challenges of penetration testing.

Learning from the course :

The Course is designed to make participants in Johannesburg, Durban and Cape Town able to design, implement, and support networked devices to take advantage of the growing demand for network security professional with networking fundamentals and advanced concepts and design strong encryptions with various cryptography methods. It also includes recognizing and being able to discuss various security technologies, including anti-malware, firewalls, and intrusion detection systems. Techniques and methods to detect malicious program and understand the ground lying principle of reverse engineering malicious software using network and system utilities, Frame methods and strategies to assess the security posture of multiple web applications. The learning also teaches conducting an in-depth analysis of android file system for security assessment with reverse engineering tools for android applications. Perform regulatory or compliance requirements that mandate regular penetration testing and vulnerability assessments.

The course helps to discover essential computer / digital forensic tools and techniques for investigation and incident response and use forensic skills to handle real world incidents in South Africa along with understanding the process of exploit development along with C and python language and also create and customize exploits for penetration testing and vulnerabilities. Cyber- crime investigation will give an insight on various cyber- crime cases and criminal modus operandi and live cases handling for real time experiencing in South Africa.

img

Certification :

The entire program covers basic outline of cyber security in South Africa as well as methods and techniques of how attacks are performed and possible outcomes of attacks along with the detection and prevention methods for the same. Thus, the practical exam after the course is entitled for certification aiming at how participants use skills, expertise and knowledge gained throughout to detect the possible attacks and methods to penetrate, hence to be specialized for the modules covered candidates are required to clear the set performance criteria for certification.

Requirements :

We use Simulation test method to provide real time challenge which will help participants to use skills, expertise and knowledge acquired during the entire course.

  • Passing Criteria: 80% and above
  • Duration of test: 5 hrs
img

Excellence Award :

Participant with highest score in batch will be awarded with Cyberops Labs award of performance Excellency – CAPE Medal and certification of Merit.

Terms & Conditions :

  • No. of attempts : Two
  • Verification method for certification : The certificate will incorporate a unique ID for every participant and the same can be used for verification from Our Website.
Read More
img

CO-APE CyberOps Android Pentest Expert

  • Duration: 2.5 Months
  • Course Level: Advance

Modules to be covered

The Module is designed to give an introduction to the fundamentals of different operating system like Windows, Linux, iOS and Android. He major intend of the module is to build the basics in Android Application penetration testing and development. The course also offers a complete knowledge of basic working of smartphones and Linux, principles and the key terms associated with Android for the beginners.

The module will convey an in depth knowledge of computer networks and need of networking model and the basic tasks involved in connecting to the network, monitoring the network connection (including connection changes), and giving users control over an app's network usage. It will also discuss how to parse, consume XML data and connect to the network, choose an HTTP client, and perform network operations outside of the UI thread.

Along with various Protocols used at each layer with focus on Networking Layers, it will also mark a description on network design and implementation and what devices are used for the data transmission.

This module aims to implement understanding of how virtual machines are separated inside the same physical host and how they communicate with lower hardware levels. Working of virtualization technology, rooting the Android Emulator in the device and basic working of emulator and its networking is also inclusive in the course. The course also teaches the installing of Gsuite to sync data with Outlook and ARM Packages in the Emulator.

This module gives an insight on the Android app structure which describes the various modules contained within an instant app project in Android Studio 3.0 along with its features, feature modules and feature APKs. The other part of this module covers the basic introduction to Java for android apps which is both similar and quite different from other types of Java applications. Building a simple Android app and creating a new interface for the app that takes certain user input and opens a second screen in the app is also a prominent part of the module.

Participants tend to engage in privilege management in this module which allows one to remove admin rights from all users to stop attackers from exploiting privileges and gaining access to your data and Android Permission Manager where you can control the permissions an app can access afterits installation.

It also comprises the introduction to APK Permission Analysis which is proposed due to the mess of privacy leaks and property damages of users.

The second half of the module explores and describes the ways to analyze the network traffic data, improving an app's networking performance , reducing power consumption and Reverse Engineering. Students will also be able to learn how to unzip, edit and zip an android APK.

This section will provide an introduction on how you get complete access to everything in the operating system and permission to do anything to any file at any place in the system. This includes things we want to do, like uninstall application forced on us by the people who built them or the people who sell them to us as well as things we don't want to do that can put your Android in an unusable state.

This module will incorporate various sections like introduction to OWASP, SQLite data storage, detection of poor authentication and authorization by performing binary attacks against the mobile app while it is in offline mode. Students will also learn about the possible vulnerabilities associated with broken cryptography that may be introduced in Android apps and can be exploited by an attacker. Within many sections of this module, you will also learn about two kinds of SQL-injection vulnerabilities and how it impacts the android OS.

Students will get familiar with an Open Source framework for Automated Mobile Security Assessment, learn about One Click Report Generation and Security Assessment and how to deploy testing framework at your own environment so that you have complete control of the data. Performing Automated Security Assessment for Android Applications, learning about the semi-Automatic Dynamic Analyzer for intelligent application logic based (white box) security assessments and how an attack vector that often comes up on Android, namely intent spoofing occurs is also a major teaching of this module.

This module will cover Android SDK/NDK and related tool chains along with analyzing exploits on Android and kernel Android vulnerabilities as well as discussing jailbreaks and the various attack surfaces of Android applications. Students will also learn the basics of writing buffer overflow exploits debug and analyze applications on ARM and MIPS architecture and to format string exploits throughout their time on the module.

img

Who should attend?

Course is designed to address the needs of :

  • Anyone with Computer engineering background or pursuing BCA/MCA.
  • Ethical Hacking Students.
  • Security Analysts.
  • Law Enforcement Personnel.
  • IT Personnel working in Android Development domain.
  • IT Personnel working in IT-Security domain.

Recommendation :

Course is suitable for those who wish to explore the information security world in South Africa and join field of Android Application Penetration Testing as a profession or aiming to explore new career opportunities. This is the most intensive course offered by Cyberops Labs training which will provide a unique perspective into the intricate world of information and Cyber security in the country. Thus, the course is highly recommended to:

  • Professionals who are looking for prospective career opportunities in cyber security field in South Africa.
  • This course is most recommended for Security Enthusiasts, IT professionals, and Mobile Application Developers seeking to understand typical mobile application security issues in detail.

Pre-Requisite :

One must have a basic knowledge of programming fundamentals.

One should also have the basic knowledge of programming languages such as Java.

Basic security concepts such as: cryptography, reverse engineering, SQL injections and web tools such as Wire shark and OWASP ZAP (or Burp).

img

Course Package includes :

  • Cyberops Labs Welcome Kit
  • Advanced Software Toolkit
  • Challenges of penetration testing.

Learning from the course :

One of the most intensively structured courses on our training programme, this course provides a complete guide to understand and practice the Android Mobile Application and ethical hacking of the same efficiently in South Africa. The modules include vivid explanation of the terminologies and their functionality. For a deeper understanding, the students are taught practically on well- equipped labs which also help them build basics by working on different operating systems (windows, Linux). Briefing them on android smart phones and its versions contributes to a major part of the module which further includes techniques and methods on how to penetrate Android Mobile Applications, how to begin with android app penetration testing, network monitoring on devices, ethical hacking of vulnerable applications that have been created by our trainers in order to help you practice all the hands-on exercises and finally some automated tools to complete the task. The course contains more than 14 challenges where we will teach you how to crack it. One can discover all the android application security models which play an important role in the design and evaluation of high assurance security systems on this course. It also focuses on Virtualization, APK File Structure, networking emulator, ARM packages in emulator, Android Application Development Basics, Privilege Management & Escalation, Analyzing and Root Access in Android. All the doubts related to this course are thoroughly discussed by our qualified trainers in the discussion session as it comprises the most important cyber security and ethical hacking in the cities of Johannesburg, Durban and Cape Town in South Africa.

img

Certification :

The entire program covers basic outline of cyber security as well as methods and techniques of how attacks are performed and possible outcomes of attacks along with the detection and prevention methods for the same in South Africa.

Thus the practical exam after the course is entitled for certification aiming at how participants use skills, expertise and knowledge gained throughout course to detect possible attacks and methods to penetrate, hence to be specialized for the modules covered candidates are required to clear the set performance criteria for certification.

Requirements :

We use Simulation test method to provide real time challenge which will help participants to use skills, expertise and knowledge acquired during the entire course.

  • Passing Criteria: 80% and above
  • Duration of test: 5 hrs
img

Excellence Award :

Participant with highest score in batch will be awarded with Cyberops Labs award of performance Excellency – CAPE Medal and certification of Merit.

Terms & Conditions :

  • No. of attempts : Two
  • Verification method for certification : The certificate will incorporate a unique ID for every participant and the same can be used for verification from Our Website.
Read More
img

Summer Training CyberOps InfoSec Expert

  • Duration: 2 Months
  • Course Level: Intermediate

Modules to be covered :

The participants enrolled for the module are given an introduction to the fundamentals of internet and the history of primary concepts to the current trending concepts of information security world in South Africa. The course offers a complete knowledge of basic security concepts, principles, and the key terms associated with information security and cyber world for the beginners in the country. The primary intent of the module is to clear misbelieve and myths surrounding the cyber world and to study the recent trends as well as threats and modus operandi of cyber criminals and testers.

The module will teach the basic definition of Network and its various concepts. It will further cover an in depth knowledge of OSI model, TCP/IP model and how data is transmitted through these networks along with various Protocols that are used at each layer with focus on Networking Layers, Network design and its implementation. Devices used for data transmission i.e. hardware associated with networking like switches, router, hub etc. along with various types of network, internet protocol v4 & v6, ports & protocols, sub netting concepts, domain name system and its working, Network architecture and standards are various other aspects covered on the module.

The module will start by defining the basic terminologies, introduction of operating systems and technical aspects that may follow in the later part of module that includes how multiple operating systems are installed and configured in virtual box. Course aims to implement understanding of how virtual machines are separated inside the same physical host and how they communicate with lower hardware levels, working of virtualization technology and components involved and the essentials to setup a lab for further modules in this course like web application hacking, malware analysis.

Open Source intelligence (OSI) is focused on collecting as much information as possible about a target which can be organization, a person, website or a specific system. The module is designed to give an insight of OSI methods and its techniques i.e. various ways to collect information from publically available resources such as e-Mail spoofing, fake mail tracing by using various methods.

The module will then provide elementary knowledge about advanced search techniques in various search engines used by security professionals and cyber criminals. This will be further followed by introduction to social engineering techniques like phishing for email id hacking, desktop phishing, remote phishing and how they are essential in information gathering.

Data security is essential for Information protection and thus, needs to be encrypted. The module begins with its introduction starting from its origin to traditional methods and latest modern techniques.

The second half of the module explores and describes the basic concepts of cryptography including secret key and public key systems, encoding and decoding. The module also demonstrates how Hash Values are created using cryptographic hash function by studying hash techniques and also how to crack the same. Introduction to data protection techniques like steganography is involved along with the understanding of how cryptography applies complex mathematics and logic to design strong encryption methods.

The module will begin with an introduction of loopholes in protected Wi-Fi networks and its testing. Students will be able to learn testing security of a protected Wi-Fi network. In the later phase, the module will include practical demonstration of internal network attacks like sniffing, MITM, DNS cache poisoning.

Module will also incorporate introduction of misconfigurations and loopholes in router security along with various internal security concepts like firewalls, IDS and IDPS. Module will later cover scanning networks for live systems and their open ports as well as operating system, finger printing and grabbing banners of running services on remote system. It will also give insight on scanning of known vulnerabilities.

The course includes basic terminologies and concept of Malware – its definition, why and how it is affecting the network and the system, key tools and techniques of malware attacks. Students will also be briefed about creating various types of malware (virus, worms, Trojans, key loggers etc.) Concepts of antivirus and their working along with the techniques to identify Malwares which are not detected by AVs are also an essential part of the module.

The module starts with an introductory knowledge of database and working with database using SQL queries along with installation and working for local servers followed by basic working of HTTP with request and host examples. Basic html, javascript, php, sql are included in this module to make students better understand the loopholes. By the end of this module, students will be able to test for different type of loopholes in web application security in South Africa. The module includes the basic fundamentals of web application including both client and server side scripting and possible web application attacks like SQL Injection, cross site scripting, local file inclusions and remote file inclusions and also medium level attacks like click jacking etc. They will also be able to patch loopholes in web application.

Metasploit is a framework which allows a security tester to arrange their exploits and launch them easily and the way it covers different types of pre build exploits. The module also covers exploitation techniques for different types of systems like windows, android, MAC.

Almost every case of cyber-crime involves a very strong element of system based evidence such as phones, smart phones, computers, etc. The module will teach the participants the basics of forensics and introduction to basic concept of data recovery from different types of storage devices and image creation for any storage device for data recovery.

It will further also give clarity on concepts of data like data deletion possibilities of recovery and dependencies for the same.

In this module basic C and Python language will be discussed with students. This module will also cover the techniques used by testers to create exploits.

As a result, participants will be able to create their own exploits using Buffer Overflow vulnerabilities.

This final session will include various cyber-crime cases and criminal modus operands where the cases solved by Cyberops Labs will also be discussed.

Methods to handle cyber-crime cases and the Do’s and Don’ts of handling them will be discussed. Indian IT act with reference to case studies from Cyberops Labs will be discussed with the students in Johannesburg, Cape Town and Durban.

img

Who should attend?

Course is designed to address the needs of :

  • Those who intend to explore cyber security field associated threats and countermeasures and are new to terminologies and concept of cyber security world in Johannesburg.
  • Technical background students who aim for advanced learning in cyber security field in South Africa as this will help them to understand the advanced concepts and terms of cyber world.
  • The course is designed for all industry spectrums professionals who want to acquaint with the basics of concepts, terminologies of information security, networking, cryptography and all that aspects that frame the underlying concepts of cyber security and countermeasures.

Recommendation :

This course provides a theoretical as well as practical knowledge on information security that will help participants to gain vital skills required to know the essential of information security in South Africa and working knowledge in cyber invasion methods and cyber security countermeasures to assist Individual in preventing cyber-attacks and protecting their systems and information. Thus, the course is highly recommended to:

  • College students who aim to understand the cyber security aspects.
  • Corporate and government/ investigators and network security personnel.
  • Individuals working in a data audit, policy enforcement, or network intrusion investigation role.

Pre-Requisite:

Participants should have basic knowledge of computer system and internet surfing.

img

Course Package includes :

  • Cyberops Labs Welcome Kit
  • Advanced Software Toolkit
  • Remote access to test beds for two weeks
  • Research project for students

Learning from the course :

The Course will help the participants to understand the security terminology in South Africa. The trainings to be held in Johannesburg, Cape Town and Durban will encourage participants to learn to design, implement, and support networked devices which will help them to understand how information and network security support cyber security and along with the installation of virtual servers and workstations.

In the later modules, it will discuss various security technologies, including anti-malware, firewalls, and intrusion detection systems. The students will learn about Cryptography and methods to collect information from centralized database systems like IP where the site is hosted, server information, mail server information.

The modules also teaches the exploitation techniques and capabilities for penetration testing and how to conduct investigations to correctly gather analyze and present digital evidence to both business and legal audiences. The course will end with Cyber- crime investigation will give an insight on various cybercrime cases and criminal modus operandi and live cases handling for real-time experiencing in South Africa.

img

Certification :

The entire training course covers the basic outline of cyber security as well as methods and techniques of how attacks are performed and possible outcomes of attacks along with the detection and prevention methods for the same.

Thus, the practical exam after the course is entitled for certification aiming at how participants use skills, expertise and knowledge gained throughout course to detect possible attacks and methods to penetrate, hence to specialize for the modules learnt, the candidates are required to clear the set performance criteria for certification.

Requirements :

We use Simulation test method to provide real time challenge which will help participants to use skills , expertise and knowledge acquired during the entire course.

  • Passing Criteria:: 80% and above
  • Duration of test: 5 hrs
img

Performance Give outs :

Participant with highest score in batch will be awarded with Cyberops Labs award of performance Excellency – CAPE Medal and certification of Merit.

Participants scoring 80% and above will be awarded with Certification of Merit.

Terms & Conditions :

  • No. of attempts : Two
  • Verification method for certification : The certificate will incorporate a unique ID for every participant and the same can be used for verification from Our Website.
Read More

Vulnerability Assessment and Penetration Testing

“A cyber security breach can strike at any time, putting your organization at risk”

One of our services, Vulnerability Assessments and Penetration Testing (VAPT) offers the ability to perform security audit and provide recommendations for security disruption. Monitoring security for risk analysis, forensics and penetration testing are also some of its core strengths. The main cities covered in our services are Cape Town, Johannesburg and Durban in South Africa. The company will provide services for VAPT in South Africa, VAPT in Johannesburg, VAPT in Durban, VAPT in Cape Town.

What is Vulnerability Assessment and Penetration Testing?

  • VULNERABILITY ASSESSMENT

    It involves intensive scanning through various security validations locating the liable flaws in the pre- existing code. Though, it does divulge the information about the level of impact or destruction caused by these flaws.

  • PENETRATION TESTING

    The penetration testing helps us measure that particular flaw in the system radiating to the maximum level of destruction of all the flaws discovered in Vulnerability assessment. This method helps exploit the analyzed vulnerabilities manually or using various tools.

  • VULNERABILITY ASSESSMENT AND PENETRATION TESTING (VA/PT)

    Hence, the programme VAPT is a combination of both VA & PT, which not only identifies the flaws in the system but also measures the intensity of each of it. VAPT helps classify the nature of the risk involved and creates an alarming situation before any explosion.

*Vulnerability: A flaw or weakness in system security procedures, design, implementation, or internal controls that may result in a security breach or a violation of the system’s security policy.

VAPT Roadmap

img
img
img

Clientele

logo

Indian Airforce

logo

Indian Army

logo

National Security Guard

logo

CRPF

logo

BPRD

logo

Delhi Police

logo

MP Police

logo

Rajasthan Police

logo

SVPNPA Hyderabad

logo

IIT Jodhpur

logo

NIT Trichi

logo

Chandigarh University

Our Offices

South Africa Office:

624 Louis botha ave Bramley, Johannesburg, South Africa

icon 0114401621 | 0828278676

icon 0865717104 Fax

India Office:

1-A Vishveshwarya Nagar, Gopalpura Bypass,
Jaipur-302018, Rajasthan, India

icon +91 9116117170 | 0141-2763411 | +91 9772200143

Contact Us

Leave us a message and our representative will get in touch with you shortly.