OUR CLASSES/TUTORIAL

WEB DEVELOPMENT CLASS

INTRODUCTION TO JAVA

* Programming Concepts

Syntax, Keywords and Identifiers
Variable at a glance
Naming Rules and Styles
Statements and Expressions
* Working with Data

Data Types in Java
Primitive Data Types
Assigning Data to Variable
String and the addition operator(+)
Math methods
Precedence and Associativity
* More Issues on Data Manipulation

Numeric Data Type Specification
Data Type Conversion
Expression with multiple data types
Overflow and Underflow
Compound Assignment
Increment and Decrement
* Using Objects

Classes and Objects
Useful String methods
Reading input string from keyboard
Converting strings to numbers
Useful methods in class integer/double
Increment and Decrement
* Decisions

Controlling the flow of your program
'If' Construct
'If-else' Construct
Nested If
'If-else-if' Construct
The ?: Operator
Equality testing for values of Data Types
'If' Construct
'If-else' Construct
Nested If
'If-else-if' Construct
* Iterations

Repetitive Execution
'do-while' Statements
'while' Statements
'for' Statements
'break' and 'continue'
Nested Loops
Scope Of Variables
* Methods

Using a method
Defining a method
Multiple Return Statement
Local variable
Method invocation technique
Passing by value Vs. Passing by Reference
Method Overloading
* Arrays

Requirement for a list of values
One Dimensional Array
Explicit Initialization
Arrays and Methods
'String [] args' Demystified
Sequential Search
Selection Sort
Multi-dimensional Arrays
Initializer lists for Multi-dimensional Arrays
* Recursive Problem Solving

Recursive problem solving
Recursive method design
Cost of Recursion
Reducing numbers of method calls
* Creating Classes

Defining your own data type
Java programs and Java Classes
Components of class definitions
Instance variables and their access levels
Object Composition
Static and Non Static Data Members
Accessor and Mutator Methods
Putting main() into class definitions
Constructors
Overloading Constructors
Calling a constructor from other constructors
* Inheritance

Creating Sub-classes from Sper-Classes
Designing Class Inheritance Hierachy
Access level and subclasses
Keyword 'super'
Polymorphism
Method Overriding
Instance creation Mechanism

INTER-CONNECTION OF JAVA

* How to connect HTML/CSS files to Java files
* How to connect MySQL Database to Java files
* How to setup the security configuration
* How to package a webapp as a war file
* How tp deploy the webapp to be accessible online
* How to build webapps for banks, groups and firms

WEB DESIGN CLASS

HTML

* Introduction to HTML
* Structure
* Text
* List
* Images
* Tables
* Forms
* Extra Markup
* Flash, Video & Audio

CSS

* Introduction to CSS
* Color
* Text
* Boxes
* Lists, Tables & Forms
* Layout
* Images
* HTML5 Layout
* Process & Design

ETHICAL HACKING CLASS

INTRODUCTION TO KALI LINUX

* Hacking Lab Setup

Virtual Machine
Installing Virtualbox (Windows & MAC)
Installation of Kali Linux
Installing Virtual Windows
* Kali Linux 101

Kali Overview
Navigation and Moving Stuffs
Priviledge and Permission
Linux Folders
Linx Package Managers
Nano
* Anonymity Online

Anonymity Introduction
How Network Work
VPN & DNS Explained
Running VPNBooks
Changing DNS
Solution to general problems
* Dark Web

Dark web introduction
Installing Tor on Kali
Browsing dark web
* Network Pentesting

Introduction to Network Pentesting
Chipsets
Kali Linux WiFi Card list
Connecting WiFi USB
Solution to common connection problems
MAC address
Monitor Vs Managed
* Gathering Information from Network

Network Sniffing
Airodump Specific Target
Deauthentication Attacks
* Wireless Attacks

WEP Settings & Encryption Logic
Cracking WEP
Fake authentication
WPA & WPA2
Capturing handshake
WPA Cracking and Wordlist Alternatives
Method Overloading
* Post Connection Attacks

Netdiscover
nMap
ARP Protocol
Manual ARP Poison
Wireshark Analysis
Bettercap Installation
ARP Attack
Sniffing Passwords
HSTS
Changing caplet
How to protect yourself
* System Pentesting

Introduction to System Pentesting
Installing Metasploitable
nMap Scan and Results
Telnet vs SSH
Samba
Meterpreter
* Attacks On Users

Installing Veil
Creating Backdoors
Bypassing Anti-Virus Solutions
Using Multi Handler
Test Backdoor
What is Fud?
FtaRat Features
* Social Engineering

Introduction to Social Engineering
Ngrok Settings
Accessing Location, Camera, Microphone
Malware Types
Maltego
Choosing Images & Combining Files
Hacking Windows
Changing the Extension
Fake Emails
* Social Media Security

Instagram Social Engineering
Connecting with Discord
More believable attacks
* Beef

Beef Introduction
Hooking targets
Injection & Taking Screenshots
How to steal facebook password
Backdoor Delivrery
How to protect yourself
* External Network Attacks

External Network Attack Options
Tunneling Service
Msfvenom
Hacking Windows
Running Veil with Ngrok
Optional: External Backdoor with Port Forwarding
Optional: External Backdoor with Port Listening
Setoolkit
Hacking Gmail
sendEmail
* Post Hacking Sessions

Meterpreter Sessions
Migration
Downloading files
Capturing keylogs
Sustaining The Session
* Hacker Methodology

Hacker Methodology Introduction
Ethical Hacker Steps
Detailed explanation of methodology
* Website Reconnaissance

Website Reconnaissance Introduction
Website Pentesting Setup
Using Maltego
Netcraft
Reverse DNS Lookup
Robots
Subdomains
* Website Pentesting

Code execution vulnerability
Reverse TCP Cpmmands
File Upload Vulnerability
Sqlmap
Zap Analysis
File inclusion
* Cross Site Scripting

XSS
Reflected XSS
Stored XSS
Real Hacking with XSS
* Ethical Hacking Certifications

Options for certification
Certified Ethical Hacker
OSCP

OUR CLASSES/TUTORIAL

WEB DEVELOPMENT CLASS

INTRODUCTION TO JAVA

* Programming Concepts

Syntax, Keywords and Identifiers
Variable at a glance
Naming Rules and Styles
Statements and Expressions
* Working with Data

Data Types in Java
Primitive Data Types
Assigning Data to Variable
String and the addition operator(+)
Math methods
Precedence and Associativity
* More Issues on Data Manipulation

Numeric Data Type Specification
Data Type Conversion
Expression with multiple data types
Overflow and Underflow
Compound Assignment
Increment and Decrement
* Using Objects

Classes and Objects
Useful String methods
Reading input string from keyboard
Converting strings to numbers
Useful methods in class integer/double
Increment and Decrement
* Decisions

Controlling the flow of your program
'If' Construct
'If-else' Construct
Nested If
'If-else-if' Construct
The ?: Operator
Equality testing for values of Data Types
'If' Construct
'If-else' Construct
Nested If
'If-else-if' Construct
* Iterations

Repetitive Execution
'do-while' Statements
'while' Statements
'for' Statements
'break' and 'continue'
Nested Loops
Scope Of Variables
* Methods

Using a method
Defining a method
Multiple Return Statement
Local variable
Method invocation technique
Passing by value Vs. Passing by Reference
Method Overloading
* Arrays

Requirement for a list of values
One Dimensional Array
Explicit Initialization
Arrays and Methods
'String [] args' Demystified
Sequential Search
Selection Sort
Multi-dimensional Arrays
Initializer lists for Multi-dimensional Arrays
* Recursive Problem Solving

Recursive problem solving
Recursive method design
Cost of Recursion
Reducing numbers of method calls
* Creating Classes

Defining your own data type
Java programs and Java Classes
Components of class definitions
Instance variables and their access levels
Object Composition
Static and Non Static Data Members
Accessor and Mutator Methods
Putting main() into class definitions
Constructors
Overloading Constructors
Calling a constructor from other constructors
* Inheritance

Creating Sub-classes from Sper-Classes
Designing Class Inheritance Hierachy
Access level and subclasses
Keyword 'super'
Polymorphism
Method Overriding
Instance creation Mechanism

INTER-CONNECTION OF JAVA

* How to connect HTML/CSS files to Java files
* How to connect MySQL Database to Java files
* How to setup the security configuration
* How to package a webapp as a war file
* How tp deploy the webapp to be accessible online
* How to build webapps for banks, groups and firms

WEB DESIGN CLASS

HTML

* Introduction to HTML
* Structure
* Text
* List
* Images
* Tables
* Forms
* Extra Markup
* Flash, Video & Audio

CSS

* Introduction to CSS
* Color
* Text
* Boxes
* Lists, Tables & Forms
* Layout
* Images
* HTML5 Layout
* Process & Design

ETHICAL HACKING CLASS

INTRODUCTION TO KALI LINUX

* Hacking Lab Setup

Virtual Machine
Installing Virtualbox (Windows & MAC)
Installation of Kali Linux
Installing Virtual Windows
* Kali Linux 101

Kali Overview
Navigation and Moving Stuffs
Priviledge and Permission
Linux Folders
Linx Package Managers
Nano
* Anonymity Online

Anonymity Introduction
How Network Work
VPN & DNS Explained
Running VPNBooks
Changing DNS
Solution to general problems
* Dark Web

Dark web introduction
Installing Tor on Kali
Browsing dark web
* Network Pentesting

Introduction to Network Pentesting
Chipsets
Kali Linux WiFi Card list
Connecting WiFi USB
Solution to common connection problems
MAC address
Monitor Vs Managed
* Gathering Information from Network

Network Sniffing
Airodump Specific Target
Deauthentication Attacks
* Wireless Attacks

WEP Settings & Encryption Logic
Cracking WEP
Fake authentication
WPA & WPA2
Capturing handshake
WPA Cracking and Wordlist Alternatives
Method Overloading
* Post Connection Attacks

Netdiscover
nMap
ARP Protocol
Manual ARP Poison
Wireshark Analysis
Bettercap Installation
ARP Attack
Sniffing Passwords
HSTS
Changing caplet
How to protect yourself
* System Pentesting

Introduction to System Pentesting
Installing Metasploitable
nMap Scan and Results
Telnet vs SSH
Samba
Meterpreter
* Attacks On Users

Installing Veil
Creating Backdoors
Bypassing Anti-Virus Solutions
Using Multi Handler
Test Backdoor
What is Fud?
FtaRat Features
* Social Engineering

Introduction to Social Engineering
Ngrok Settings
Accessing Location, Camera, Microphone
Malware Types
Maltego
Choosing Images & Combining Files
Hacking Windows
Changing the Extension
Fake Emails
* Social Media Security

Instagram Social Engineering
Connecting with Discord
More believable attacks
* Beef

Beef Introduction
Hooking targets
Injection & Taking Screenshots
How to steal facebook password
Backdoor Delivrery
How to protect yourself
* External Network Attacks

External Network Attack Options
Tunneling Service
Msfvenom
Hacking Windows
Running Veil with Ngrok
Optional: External Backdoor with Port Forwarding
Optional: External Backdoor with Port Listening
Setoolkit
Hacking Gmail
sendEmail
* Post Hacking Sessions

Meterpreter Sessions
Migration
Downloading files
Capturing keylogs
Sustaining The Session
* Hacker Methodology

Hacker Methodology Introduction
Ethical Hacker Steps
Detailed explanation of methodology
* Website Reconnaissance

Website Reconnaissance Introduction
Website Pentesting Setup
Using Maltego
Netcraft
Reverse DNS Lookup
Robots
Subdomains
* Website Pentesting

Code execution vulnerability
Reverse TCP Cpmmands
File Upload Vulnerability
Sqlmap
Zap Analysis
File inclusion
* Cross Site Scripting

XSS
Reflected XSS
Stored XSS
Real Hacking with XSS
* Ethical Hacking Certifications

Options for certification
Certified Ethical Hacker
OSCP