enrollment on going

Cyber Security
Professional

Cyber Security Professional

Transfotech Academy provides well organized online cyber security training. This training will help cybersecurity professionals at all stages of their careers. Our training program will allow beginners to increase their skills and confidently pursue their careers in cyber security.

Course Structure Overview

Student Dashboard

We provide an individual dashboard for each and every student of ours. It will help you track down all of your classes, materials and progress.

Online Live Classes

You can attend our cyber security class online in your own comfort. The classes will be live. You can engage efficiently during online classes.

Recording of the Classes

If you miss out on anything during our cyber security online training, you can easily access our recorded classes and keep up with the rest.

Resume Building

An organized resume can easily get you your targeted job. Our cyber training online classes will assist you to build a standard job resume.

Interview Preparation

An interview is a gateway to getting a job. It is very crucial for landing a good job. Transfotech will also help you prepare for your interview.

Easy Enrollment

This online program of ours is very easy to register for. Your desired job is just a few clicks away.

What you will learn by doing the course

Cybersecurity professionals are in high demand, and the job market for these skilled individuals is projected to continue overgrowing in the coming years. Learn cyber security online and promote safety, security, and privacy in the digital realm.

Details about the course

  • Importance of Web Application Security 
  • Understanding Industrial Standards 
  • What is OWASP? 
  • Introduction to OWASP Top 10 Vulnerabilities 
  • Introduction to Burp Suite 
  • Understanding Information Gathering 
  • What is WHOIS? 
  • Information Gathering Tools 
  • Search Like a Pro Using Google Dorks
  • What is SQL? 
  • Basic Queries of SQL 
  • Authentication Bypass using Basic SQL Injection 
  • Advanced MySQL Injections 
  • Advanced MSSQL Injections 
  • Database Dumping using Advanced SQL Injection 
  • Firewall Evasion Techniques for SQL Injection 
  • Automated Tools 
  • Practical Demonstration on Real Web Application
  • Account Lockout Mechanism 
  • Enumeration Techniques 
  • Captcha Bypass 
  • Session Expiration 
  • Logout Management 
  • Concurrent Misconfigured Sessions 
  • Practical Demonstration
  • Introduction to Cross Site Scripting 
  • Types of Cross-Site Scripting 
  • Non-Persistent XSS 
  • Persistent XSS 
  • DOM Based XSS 
  • Exploiting XSS to steal session cookies, csrf tokens, etc. 
  • Preventing XSS 
  • Introduction to CSP 
  • Practical Demonstration on Real Web Application
  • Introduction to IDOR Vulnerability 
  • Finding out IDOR 
  • Exploiting IDOR 
  • Preventing IDOR 
  • Practical Demonstration on Real Web Application
  • Arbitrary File Upload 
  • Introduction to CORS Exploiting CORS 
  • Introduction to SOP SOP Bypass 
  • Introduction to HSTS 
  • Exploiting HSTS 
  • MITM Attack using Wireshark 
  • Directory Listing 
  • Practical Demonstration on Real Web Application
  • Full Path Disclosure 
  • Cross Domain Referer Leakage 
  • Robots.txt Disclosure 
  • Practical Demonstration on Real Web Application
  • Introduction to Missing Functional Level Access Control 
  • OTP Bypassing Techniques 
  • Privilege Escalation 
  • Practical Demonstration on Real Web Application
  • Introduction to Cross-Site Request Forgery 
  • Finding CSRF 
  • Exploiting CSRF 
  • Preventing CSRF 
  • Practical Demonstration on Real Web Application
  • Introduction to 3rd Party Components 
  • Finding 3rd Party Components 
  • Exploiting 3rd Party Components 
  • Preventing Using Components with Known Vulnerabilities 
  • Practical Demonstration on Real Web Application
  • What are Redirects & Forwards 
  • Finding Redirects & Forwards 
  • Exploiting Redirects & Forwards 
  • Preventing Unvalidated Redirects & Forwards 
  • Practical Demonstration on Real Web Application
  • Server-Side JavaScript Injection 
  • Server-Side Template Injection 
  • Server-Side Request Forgery 
  • Cross Site Port Attack 
  • XML External Entities (XXE) Attacks 
  • Subdomain Takeover 
  • Local File Inclusion 
  • Host Header Attack 
  • Homograph Attack 
  • Race Condition Issue
  • Understanding API & API Security 
  • Introduction to OWASP API Security Top 10 
  • Broken Object Level Authorization 
  • Broken User Authentication 
  • Excessive Data Exposure 
  • Lack of Resources & Rate Limiting 
  • Broken Function Level Authorization 
  • Mass Assignment 
  • Security Misconfiguration 
  • Injection 
  • Improper Assets Management 
  • Insufficient Logging & Monitoring
  • Introduction to Bash & Other Shells 
  • Getting familiar with basic Linux Commands (ls, cd, mv, nano, cat, etc.) 
  • Learning Important Commands for Shell Scripting (Redirect, Pipe, Find, Grep, AWK, SED, Sudo, chmod, etc.) 
  • Learning Arithmetic Expressions, Conditions, Loops, etc. 
  • Writing a problem-solving Bash Script from scratch 
  • Bash Scripting Project
  • What are Responsible Disclosure Programs 
  • What are Bug Bounty Programs? 
  • Bug Bounty Platforms 
  • How to Report a Bug to a Company? 
  • How to earn money (bounty) by reporting a legitimate bug? 
  • What are Responsible Disclosure Programs 
  • What are Bug Bounty Programs? 
  • Bug Bounty Platforms 
  • How to Report a Bug to a Company? 
  • How to earn money (bounty) by reporting a legitimate bug? 

Course Instructor

SHEIKH GALIB RAHMAN

CEO, Chief Instructor

Transfotech Academy

Over more than a decade, Sheikh has been involved with Information Technology Training. He has provided corporate IT tainting to over 10,000+ IT personnel across the top three large IT consulting companies of the world such as Accenture, Capgemini and IBM. To take his training skills to the next level and spread across the globe Sheikh has established Transfotech Academy, a Quality IT Training Institute in the heart of New York for Newcomers into the field of Information Technology. Sheikh is a visionary Global Corporate Leader who has spent more than a decade serving multiple fortunes 500 companies across the globe such as Accenture, Capgemini, Chase, Capital One, Microsoft, IBM etc. Sheikh has also worked for US Government in a number of high-tech projects as Project Leader, including US Department of Homeland Security, USCIS, Executive Office and US Federal Reserve Bank. A large number of students get training from Transfotech Academy and successfully launch their career in US Corporate IT Companies every year.

Smith-Shah

Smit Shah

Instructor

Smit, an ethical hacker and entrepreneur, discovered his passion for hacking in 8th grade. He’s secured 70+ Indian Co-operative Banks and 50+ online businesses with his company, eSecurify. Smit has also reported security bugs to top cyber security companies.

Md. Abul Kalam Azad

Consultant and Instructor

Mr. Azad is currently the Head of Information Security for a reputable bank with more than 20 years of professional experience. A number of professional certifications, including CISA, CISM, CRISC, COBIT, CISSP, CDPSE, CEH, ISO 27001-LA, and ITIL, have been achieved by him during the course of his career. He had multiple research articles published in various nations, including the USA, Spain, Germany, Egypt, Hong Kong, the United Arab Emirates, and Thailand. Md. Abul Kalam Azad is an experienced cybersecurity and risk management professional. Besides, he has a comprehensive understanding of information security management and governance. He can develop and implement strategies, policies, and frameworks that align with business objectives, ensuring the organization’s information assets are protected and compliant with relevant regulations. His qualifications and experience have made him a treasure in the field of cybersecurity training.

Feedback from our students

cyber-security

What is in this course