1) Web Application penetration Testing
Description: Learn Web Application penetration using various tools and Methodologies
Mode: Online
Contact: info@securecybergates.com
High Level Contents: Burp Suite tool, Authentication vulnerabilities ,2FA broken logic, Password & 2FA bypass, Authentication bypass via information disclosure, Injection Attacks [XSS, SQL Injection, OS Command Injection etc.], Access files and Directories that are stored outside the web root folder, Access arbitrary files and directories stored on the filesystem, Business logic vulnerabilities, Application logic vulnerabilities ,Exposing highly sensitive information [Card details], Hard-coding API keys, IP addresses, database credentials, and so on in the source code , About Access Control vulnerabilities, Third-party vulnerabilities, File upload vulnerabilities, CSRF and SSRF, File-based SSRF and more...
2) ISO 27001 Implementer and Auditor
Description: Learn Implementing and auditing compliance as per ISO 27001.
Mode: Online
Contact: info@securecybergates.com
High Level Contents:
1. Assess compliance with ISO 27001:2022 standards
2. Identify gaps and non-conformities for improvement
3. Evaluate the effectiveness of information security management systems
4. Conduct thorough audits of security controls
5. Verify adherence to legal and regulatory requirements
6. Provide recommendations for enhancing information security
7. Ensure continuous improvement of security practices
8. Foster a culture of risk management awareness
9. Promote confidentiality, integrity, and availability of data
10. Enhance overall information security governance