Thursday, February 21, 2013


PYTHON SCRIPTING COURSE FOR ENGINEERING STUDENTS .


OUR OBJECTIVE :::

1) HOPE : Students of Computer Science Stream Who Have Lost their Hope and who think that they can't Achieve Any Thing Better BECAUSE they have 2nd Division in 10th/12th,Not Having Good Communication Skills,Less Marks in their Semester THEN Enroll in our Course. We BET After Doing Our Course Even if there is a Single Vacancy in your favourite Company your Chance of Selection will be 90%.

2) PRACTICAL SKILLS : Our Course Comprise of 70% Practical and 30% Theory . It will be  a Totally Interactive Session Where Not A Single Doubt will be left in your Mind . At last You will gain 3.5 times knowledge of what a full-fledge B.tech Course Offer.
We will Equip you with that much knowledge that u can Directly Jump on very Big Projects on your Own with no need of any Team and Make Your Ideas Comes To Reality.

################################################################################# 

ABOUT US ::

1) WE ARE NOT HACKERS . We Know Its Hard To Earn This Title.

2) WE WILL BE EXPERT IN CYBER-SECURITY FIELD AT THE END OF 2015  And Our Course Will Give u a chance To Grow With us . We are Hard-Working People and Working 66Hrs/Week from the Last 3 Years. So,We Have Tons of Stuff To Offer .

3) Currently We Work As a Cyber Forensic Investigator .

DISCLAIMER:: 

Don't get attracted By the company we work for as We Don't Want to Associate us with our company as We Are not Going to Provide any Training on Topics provided by our Company and We are Providing Our Course in our own free Time and We Don't want to Break any Legal Bond If Exist .

################################################################################# 
CONTENT OF OUR COURSE ::
################################################################################# 

TOPICS                                                                                      OUR KNOWLEDGE ( x / 5 )  
                                                                                                                         
1. Basics Of Python ::                                                                                      ( 5 / 5 ) 

SUB-CONTENT:
Installation of Python, Variables, Tuple, Sets, Dictionary, If-else, While,                       Function,Classes,Objects,Exception-Handling, Crash-Course On C .

2. System Programming Using Python  ::                                                        ( 5 / 5 )    

SUB-CONTENT: 
a) Start With Operating System Concepts ,

b)Programming : Handling Files, Process Creation,
Thread,Threading,Queue,Signals,SubProcess.

3. Network Programming Using Python  ::                                                      ( 5 / 5 )

SUB-CONTENT: 
a)Start With Networking Concepts : ( IP Adressing, Public/Private IP, NAT,                                              ROUTING,Four-way Handshake, DNS, Packets Structure,TCP/IP and OSI Layer,Firewall                  Security., 

b) Tips On Malware Forensic, Programming: Server-Client , Creating Web Server, Basic of                   Sniffing and Injection of Packets,Wireshark,PacketReplay Software,Coding Your Own Sniffer/Injector using Python,Sniffing/Injection using Scapy Module in Python,Coding your Own PORT Scanner in Python,Facebook cookie stealing in HTTP Connection,Coding Your Own SSLRipper that Sniff Unencrypted Data in HTTPS Connection,Using Sniffing/Injection
Techniques to Disturb Games like NFS,Counter-Strike that are Played Over LANs,Tips on
Malware Forensic using Software like INETSim,Wireshark,ApateDNS.

4. Automating Web-Platform Attack Using Python  ::                                     ( 3 / 5 )

SUB-CONTENT:
a) Start With only Basic Web-Designing( HTML,PHP,Javascript)

b) Different Types of Attacks On Web Application ( HTTP Verb Tampering, Digest Auth,Cookies           Concept.Session-ID,SSL MITM,HTML Injection,XSS,Web To Shell,JavaScript)
We Have given Rating Of (3/5) for Ourselves but it will Increase at a speed of 2x.

c) Automation Using Python: Web-Page Fetching Using Python,Screen-Scraping,Using                        Mechanize Modules to Automate Form-Submission( Ex: Coding a Command-Line Facebook
 Status Updater),Browsing With Mechanize,Xml Parsing, Introduction to Selenium( Automated  command-line Way2sms, Coding Gmail-Vulnerability Scanner That Scans All your E-mail and Gives  u warning on those Emails that contains Vulnerable Links)

5. Techniques of Exploitation and Its Automation Using Python  ::               ( 4 / 5 )

SUB-CONTENT: 
a) Full Assembly Programming ( Linux/Windows )

b) Buffer OverFlow, Format-string Vulnerability,Integer Overflow Basics and Practical , SEH               based attacks.

c) COMPLETE TRAINING ON TOPICS:
Making your Own Window-Debugger, PyDbg ( Python Based Debugger ), Using Immunity
 Debugger To facilitate Reverse-Engineering,Malware Analysis , Using IdaPro ( the best software
 in world To facilitate Reverse-Engineering,Malware Analysis ) , Hooking ( Coding your Own              Keylogger, Backdoor), DLL and Code Injection, Fuzzing ( Coding your own Fuzzer ), Sulley ,          PyEmu, Monitoring API Calls.

6. Automation Using Python on Protocols ::                                                  ( 5 / 5 )
   
Using PEXPECT, SFTP, SSH, NMAP.

7.  MALWARE FORENSIC :                                                                         (3.5 / 5 )
                                                                                                                            
     We Have given Rating Of (3.5 / 5) for Ourselves but it will Increase at a speed of 3x.
     
      TOPICS: 
        Basic Static Techniques,
        Malware Analysis in Virtual Machine,
        Dynamic Analysis,
        x86 Disaasembly,
        Ida Pro,
        Translating Assembly Codes To C Code Construct,
        Analyzing Malicious Window Programm,
        Debugging, OllyDbg, Kernel Debugging with WinDbg.
        Malware Functionality:
        Malware Behaviour,Covert Malware Launching,
        Data Encoding,Malware Focused Network,
        Anti-Reverse Engineering:
        Anti-Disassembly,Anti-Debugging
        Anti-Virtual Machine Technique,Packers and Unpacking.

################################################################################

                 CLICK TO ENROLL NOW