Professional Documents
Culture Documents
SCSP 1
SCSP 1
SpidervellA Certified
Security Professional
Co-Developed with HackersvellA
Cyber Security Professional Program
®
www.spidervella.com
®
Contents
About SpidervellA
About The Course
Key Features
Learning Path Visualisation
Program Outcome
Who should Enrol?
Course Overview
How to Enrol?
What Celebrities Says about SpidervellA?
Contact us
www.spidervella.com
®
About SpidervellA
"Building Futuristic Techno Minds” (ISO 9001:2015 Certified)
SpidervellA Technologies Pvt. Ltd. is a Bengaluru-based Ed-Tech company, leading in IT
training, enterprise learning services, IT Infrastructure Solutions, Cyber Security, and
Web Development solutions for information technology (IT) for job-seeking
professionals.
SpidervellA Technologies provides end-to-end learning services and solutions that
create a quantifiable path to improve performance and increase knowledge for
enterprise customers around India.
SpidervellA Technologies is focused on meeting the growing need for Information and
Communication Technologies (ICT) expertise in both global and local markets.
Providing its clients with IT Training, Corporate Training, IoT Solutions, Web
Development, and Cyber Security Solutions.
INDIA
Forbes Mid.Day
EURO
GLOBAL POST HBW NEWS
®
SCSP Duration :
Cyber Security 14 Weeks
Professional Program
www.spidervella.com
®
Key Features
www.spidervella.com
®
START WITH
INFORMATION SECURITY
INFORMATION METASPLOIT
SHELL
GATHERING & FRAMEWORK
VULNERBILTY DISCOVERY SCRIPTING
SNORT
WIRESHARK BURPSUIT
IDS / IPS
CAPTURE
THE FLAG
INDUSTRY INTERVIEW
www.spidervella.com
®
Program Outcome
www.spidervella.com
®
Prerequisites
Network & Server Skills.
Candidates who want to enrol in this
program, must have mentioned Cloud Computing Skills.
Technical Skills. Programming Skills.
*If Candidates don’t have these skills Database Skills.
then SpidervellA will provide fast
Web Development Skills.
track Sessions for these programs.
www.spidervella.com
®
14
13
12
11
At the beginning of this training program, we are more focusing 10
to provide as much information about information security
(Information Security is basically the practice of preventing 9
unauthorized access, use, disclosure, disruption, modification, 8
inspection, recording, or destruction of information.) 7
6
Course Curriculum 5
4
Introduction to Infosec Enumeration 3
Foot printing & Reconnaissance Denial of Service 2
Session Hijacking
1
System Hacking
W
Malware Threats Sniffing
E
Scanning Networks Social Engineering
E
www.spidervella.com K
®
14
13
12
11
10
In this week, we will focus more in-depth concepts of infosec & 9
Hacking of the different – different platforms. Types of Attacks,
8
Data Protection through cryptography, and many more.
7
6
Course Curriculum 5
4
Hacking Web servers SQL Injection 3
Cryptography
2
Hacking Web Applications
1
Hacking Mobile Platforms Cloud Computing
W
Evading IDS, Firewalls, and Hacking Wireless
Honeypots Networks
E
E
www.spidervella.com K
®
14
13
12
11
10
9
Course Curriculum 8
7
Introduction Preparing the
Python in Depth Development Environment 6
• Strings and expressions • Installing a virtual machine
• Installing and configuring 5
• Functions and conditionals
• Variables and lists
Kali Linux 4
• Setting up a Box Lab
Penetration Testing • Installing and configuring 3
• What is penetration testing? Python Kali Linux
• The five phases of pentesting
2
System Shells
Overview of Kali Linux
1
• Using Weevely
• Kali deployments • Injecting images with jhead W
• Exploit methods • Using shellcode in exploits
• The Kali menu and toolbox • Generating shellcode with
E
MSFvenom. E
www.spidervella.com K
®
14
13
12
11
10
9
Course Curriculum 8
7
Python and Kali Linux Metasploitable
• Targeting Metasploitable
6
• Creating a penetration program
•
with Python
Working with TCP Client and
• Exploiting the distribute
compile system
5
TCP Service • Exploiting network files 4
• Using raw binary packets • Achieving root
• Port scanning with NMAP 3
Mapping End-to-End Testing 2
• Kali deployments • Exploiting with EternalBlue 1
• Applying sniffing methods
• Using SQL injection: offensive and •
•
Using Devel exploits
Using Kronos exploits W
defensive
• Implementing brute force methods E
E
www.spidervella.com K
®
Course Curriculum
Linux Metasploit
• Kali Linux Commands • Introduction 14
• Directories, myfile and Nano • Metasploit Fundamentals
• IP Addressing and netcat • Information Gathering 13
• Copy Commands and crontab • Vulnerability Scanning
• chmod, manipulation & packages • Writing A Simple Fuzzer 12
• Exploit Development
• Web App Exploit DEV
11
• Client Side Attacks
• MSF Post Exploitation
10
Programming
• Fundamentals for Pen Testers
•
•
Meterpreter Scripting
Maintaining Access
9
• Bash Scripting and If/Then 8
• MSF Extended Usage
Command
•
•
Network Pings
Python for Port Scanning
7
• Python Import Command 6
5
4
3
2
1
W
E
E
www.spidervella.com K
®
Course Curriculum
Information Gathering Traffic Capture
•
•
Information Gathering Intro
Domain Name Services
• Traffic Capture Introduction 14
• Analysing Network Protocol
•
•
Targeting Email and Maltego
recon-ng and google operators
with Wireshark 13
• Address Resolution Protocol
• NMAP and Port Scanning • DNS 12
• Ettercap
• SSL Stripping
11
Vulnerability Discovery/Scanning 10
• Vulnerability Scanning Intro 9
• Nessus
• Nmap Scripting Engine 8
• Metasploit
• WebApp, XAMPP, WEBDAV, nikto 7
• Directory Transversals 6
5
4
3
2
1
W
E
E
www.spidervella.com K
®
Course Curriculum
Exploitation Post Exploitation
• Information Gathering Intro • File Transfer without and 14
• Direct Exploitation Interactive Shell
•
•
SQL Commands
Directory Traversal
• Exploit Development 13
• Pivoting
• Open Source Vulnerability • Setting Up a Domain 12
• Using Backdoor to Access an Controller
FTP Server 11
• Attaching to an IP Address
10
Advanced Exploitation
• Introduction 9
• Client Side Attacks 8
• Exploiting Java
• Social Engineering 7
• Bypassing Antivirus Software
6
5
4
3
2
1
W
E
E
www.spidervella.com K
®
Course Curriculum
Exploit Development WebApps
•
•
A Program in Memory
Stack Frame for Function
• Web App Testing 14
• Vulnerable Web Applications
•
•
GNU Compilers
Python
• SQL Injection 13
• File Inclusion
• Executing Unintended Code • Cross Site Scripting XSS 12
• Network Based Exploits and
Debuggers 11
• Creating a Cyclic Pattern
• Verifying Offsets 10
• Creating Shell Code in Kali Linux
• Fuzzing
9
• Public Exploits and Perl 8
• Turning a 3Com Exploit into a
Metasploit Module 7
• Structured Exception Handler
Over-Write 6
5
4
3
2
1
W
E
E
www.spidervella.com K
®
Course Curriculum
Smartphone Pentest Passwords
Framework
• Password Attacks 14
• SPF Introduction • Online Password Cracking
• SPF Attach to Smartphone • Offline Password Attacks 13
Based Apps •
• Turning an Android App into
Using oclhashcat / HBCD
12
•
a SPF Agent
Functionality for Agents
11
• Pentesting Mobile Devices 10
9
8
7
6
5
4
3
2
1
W
E
E
www.spidervella.com K
®
Course Curriculum
SNORT IDS AND IPS
1- Introduction of Network Design 2- Modes of Snort
• • Introduction of NIDS,
Introduction of components of
security and CIA Triad NIPS , HIDS 14
• • Different logging mode
•
Introduction of Network Threats
Common Terminology and Attack of snort 13
• Hacking Phases , and introduction • Features of Snort
• Introduction of DAQ and
12
• Firewall, and Types of Firewall
• DMZ delimitation and design modes of DAQ 11
• IDS Definition and design • Understanding Basic
• IPS Definition and design Output of Snort 10
• Introduction to Iptables • Inline mode
• Passive Mode 9
BURP SUIT (Web Penetration Testing Tool) 8
• General Concept • Sequencer And Scanner Modules
•
• Proxy Module Intruder And Comparer Modules
7
• Repeater Module
• Target And Spider 6
Modules
5
4
3
2
1
W
E
E
www.spidervella.com K
®
Course Curriculum
CYBER SECURITY RISK AND VULNERABILITY MANAGEMENT
• Evolution of Information Security
14
• Risk Management Process, Framework and Life Cycle 13
• Quantitative versus Qualitative Risk Assessment
• Defining Information Security Metrics 12
• Analysis Techniques
• Automating Metrics Calculations and Tools Weeks 11
• Case studies
• VAPT Report Documentation 10
9
8
7
6
5
4
3
2
1
W
E
E
www.spidervella.com K
®
14
13
12
11
10
9
8
7
This week will be completely dedicated to capstone practicals. 6
And Capture the Flag challenges.
5
4
3
Course Curriculum 2
Capture The Flag Challenges.
1
W
E
E
www.spidervella.com K
®
How To Enrol
Eligibility
• Applicants should have a Bachelor's degree with a minimum of
50% aggregate. (UG Students must have completed their 2nd year)
• For applicants with exceptional qualification and/or industry
experience, a relaxation in the minimum eligibility criteria may
be considered.
How To Apply
• Applicants can visit www.spidervella.com and fill the application
form.
• Applicants can also visit SpidervellA branch and fill the application
form.
• Note: INR 7,500 will be applicable for any Pre – Requisites Fast
Track Classes.
Account Details
ICICI Bank
Current Account Name : Spidervella Technologies private limited
Acc : 029905003725
IFSC: ICIC0000299
UPI : spidervella@icici www.spidervella.com
®
SHAFAQ NAAZ
Bollywood & TV Actress
RUSHAD RANA
Bollywood & TV Actress
Contact Us :
+91-6366232261 / 62 / 63 / 64
www.spidervella.com
info@spidervella.com @spidervella