Loading

welcome !


This Is The Heaven Of White Hat Hacker

Cyber Security (Ethical Hacking)

Course Fee : 14750 (Including 18% GST)

Availability : Online / Classroom

Join us to get trained on latest art of hacking, we will make you listen a total new symphony of Cyber Security orchestra — retain the knowledge long after classes end.

Network Penetration Testing

Course Fee : 14750 (Including 18% GST)

Availability : Online / Classroom

Learn Pen-Testing network & IT-infra, find vulnerabilities, exploit them & also learn how to protect network & IT-infra.

Web Application Penetration Testing

Course Fee : 14750 (Including 18% GST)

Availability : Online / Classroom

Learn Pen-Testing Web Application, find vulnerabilities, exploit them & also learn how to protect Web Application.

Mobile Apps Penetration Testing

Course Fee : Sold Out

Availability : Online / Classroom

Learn how to pen-test mobile application, exploit smart phone and also learn how to protect the digital world.

Exploit Development & Malware Analysis

Course Fee : Sold Out

Availability : Online / Classroom

Analyze malware, develop exploit on real world devices, hardened programs like those you'll see outside of the classroom. The specific type of target devices used depend on the course ( IoT or Mobile Exploitation or Web Exploitation or Network Exploitation).

Programming Language


Courses

Get taught by professional experts having leading corporate experience

PYTHON Programming

Course Fee : 5000 + 18 % GST

Availability : Online / Classroom

JAVA Programming

Course Fee : 5000 + 18 % GST

Availability : Online / Classroom

C Programming

Course Fee : 5000 + 18 % GST

Availability : Online / Classroom

C++ Programming

Course Fee : Sold Out

Availability : Online / Classroom

REACT & ANGULAR Programming

Course Fee : Sold Out

Availability : Online / Classroom

RUBY Programming

Course Fee : Sold Out

Availability : Online / Classroom

MOBILE App Development

Course Fee : Sold Out

Availability : Online / Classroom

WEB App Development

Course Fee : Sold Out

Availability : Online / Classroom

Python ®is a deeply technical programming language that focuses entirely on offensive & defensive security issues. It’s very easy to learn & adopt and it provides a wide job market in current IT industry. Python is robust, platform independent and very fast language and equipped with system level native functionalities.

Course Offered =>


  • Getting Started with Python
  • Types, Variables and Input/Output
  • Lists in Python
  • Dictionaries
  • For Loops and Tuples
  • Functions in Python
  • Object-Oriented Python
  • File Input and Output and Exceptions
  • Modules
  • Building hacking tools using python
JAVA Logo
Java ®, is a enterprise standard language that focuses entirely on Web, Android, Embedded System etc.

Course Offered =>


  • Introduction to Java(Properties, Oops, JDK & JVM & JRE)
  • Concept of Constructor
  • Encapsulation
  • Inheritance Concepts and Java Keywords
  • Access Modifiers and Packages
  • Concept of Polymorphism
  • Abstraction and Scanner Class
  • Exception Handling in Java
  • Thread Programming
  • GUI Concepts and Application Development
  • Connectivity in Java
  • Java I/O
  • Wrapper Class & Java Strings
  • Projects on Java Swing and JDBC
C Logo
Unlike most computer languages, C allows the programmer to write directly to memory. Key constructs in C such as structs, pointers and arrays are designed to structure, and manipulate memory in an efficient, machine-independent fashion.
  • Introduction to programming
  • Decision making
  • Switch case
  • Different types of loop
  • User defined functions
  • Arrays: Single and multi dimensions
  • String
  • Structure
  • Pointer
  • File handling
  • Storage class
CPP Logo
C makes it easy to shoot yourself in the foot; C++ makes it harder, but when you do, it blows your whole leg off.
  • Getting Started Programming With C++
  • Object-Oriented Fundamentals
  • C++ Basics
  • C++ Functions
  • Classes and Objects
  • Encapsulation
  • Constructors and Destructors
  • Overloading
  • Stream Input and Output
  • Polymorphic Programming
  • Inheritance
  • Virtual Functions
  • Dynamic Binding
  • Code Reuse in C++
  • Containment
  • Private Inheritance
  • Designing with C++
  • Templates
  • Exceptions
React&Angular Logo
  • Introduction to programming
  • Decision making
  • Switch case
  • Different types of loop
  • User defined functions
  • Arrays: Single and multi dimensions
  • String
  • Structure
  • Pointer
  • File handling
  • Storage class
Ruby Logo
With its simple and intuitive code, Ruby facilitates software development and saves time. On average, developers who use Ruby on Rails build applications 30-40% faster than teams that use other technologies.
  • Let’s Get It Started: Installing Ruby
  • Programming = Joy: A Whistle-Stop Tour of Ruby and Object Orientation
  • Ruby’s Building Blocks: Data, Expressions, and Flow Control
  • Developing Your First Ruby Application
  • The Ruby Ecosystem
  • Classes, Objects, and Modules
  • Projects and Libraries
  • Documentation, Error Handling, Debugging, and Testing
  • Files and Databases
  • Deploying Ruby Applications and Libraries
  • Advanced Ruby Featuress
  • Tying It Together: Developing a Larger Ruby Application
  • Web Application Frameworks: Rails, Sinatra, and Ramaze
  • Ruby and the Internet
  • Networking, Sockets, and Daemons
  • Useful Ruby Libraries and Gems
  • Live Projects
Mobile App Logo
Mobile is the enabling centerpiece of digital convergence. Mobile is the glue for all other digital industries to use when approaching convergence, but mobile is also the digital gateway for the real world to join in this global metamorphosis of human behavior.
  • Multithreading
  • Sensors in Android
  • Android Location Based Services
  • Android Google Maps
  • UAndroid Web Services
  • Android WebView
  • Android WiF
  • Android Bluetooth
  • Android Application Security2
Web App Logo
A successful website does three things: It attracts the right kinds of visitors, guides them to the main services or product you offer. Collect contact details for future ongoing relation.
  • Course Overview and Website Structure and Hosting
  • Designing Your Own Website: HTML Basics
  • Websites with Style: CSS Properties, Colors and Fonts
  • Responsive Web Design With BootStrap
  • Introduction to Programming Using JavaScript
  • Creating HTML Forms
  • Data Validation Using JS
  • Introduction to Web-FrontEnd, Web-BackEnd, Web-MiddleWare Technology
  • Introduction to Programming using PHP
  • Learn How to connect FrontEnd With BackEnd
  • Advance Web Technology Using Differents PHP Frameworks
  • Live Projects.

Hacker's


Workshops

Enhance your skills while attending a conference with Cyber Defence Labs intensive short workshops



Hacking is not about doing things in illegal way, not about destruction but how to prevent and protect the destruction in a legal and ethical way.Our Ethical Hacking workshop aims to give Technocrats a basic knowledge of hacking and how to protect your system against hazardous effects. It will also make you understood how to be safe in this modern digital era.

Cyber Security Using Python

Course Fee : Sold Out

Python is an integral programming language across everywhere now-a-days. This hands-on course is tageted for providing attendees demos and lessons on basics of Python and walk through labs portraying the usefulness Python has in a variety of information security areas.

Creating Hacking Tools Using Python

Course Fee : Sold Out

Python is an integral programming language in the field of Cyber Security and widely used for building different hacking tools. This workshop is focused on making the attendees aware about the fact and training them for building useful hacking tools using python, which they can use as a white-hat-hacker.

Defence Against Cyber Crime

Course Fee : Sold Out

This session is focused on sensitizing the attendees about the Cyber Security and the Cyber Crimes happening across the globe, training them on how to defend the crime and post-attack recovery.

Capture The Flag Workshop

Course Fee : Sold Out

Capture The Flag WorkShop

Ethical Hacking Workshop

Course Fee : Sold Out

Availability : Online / Classroom

Cyber Security Using Python

Course Fee : Sold Out

Availability : Online / Classroom

Creating Hacking Tools Using PythonSpecial

Course Fee : Sold Out

Availability : Online / Classroom

Defence Against Cyber CrimeSpecial

Course Fee : Sold Out

Availability : Online / Classroom

Capture The Flag(CTF) Workshop

Course Fee : Sold Out

Availability : Online / Classroom

Private


Training Courses

Bespoke multi-day advanced courses for corporate clients. Minimum 10 participants.

Internet of Things

Exploit Development

Learn IoT-security and memory-corruption basics by hacking IoT devices running on Arm®'s 32-bit processors.

Based around two real-world IoT targets that we will emulate, this course gets students to learn the process of building and debugging a memory-corruption exploit from scratch, bypassing exploit mitigations such as NX and ASLR along the way.

Our course begins with an introduction into the Arm architecture and assembly language, and how to build shellcode that can be used in exploits against Arm targets. Students then learn about the theory and practice of attacking memory-corruption exploits by finding and exploiting a stack-overflow vulnerability. Students then learn about exploit mitigations, what they are, and how to bypass them, and how to take over the process using both ret2libc, as well as complex ROP-chains to run in-memory only shellcode directly in the target process.

The second day of the course focuses on exploiting two real-world routers, including the process of how to emulate, debug and trigger vulnerabilities on real-world devices, and how to adapt exploits from one target to work on a different target, even when the devices use identical library versions.

The third day of the course provides a deeper study of exploit categories and techniques to make exploits reliable. Students will cover vulnerability discovery and use of “information leaks” to stabilize memory-corruption exploits, and learn about the ASLR and stack canary exploit mitigations, and how to exploit format-string vulnerabilities to bypass these mitigations.

For four-day courses, the final day is a deep-dive into the process of heap exploitation, and using heap vulnerabilities to construct exploitation primitives that can be engineered together to build powerful and reliable exploits, bypassing NX, ASLR and GCC’s in-built exploit mitigations. We begin with a review of how the glibc heap works, and begin writing an exploit against a network service containing a heap linear buffer overflow. Students will learn how to turn this buffer overflow into a reliable relative read exploit primitive to bypass ASLR, how to construct arbitrary read primitives to search target memory for useful binaries, and how to exploit and construct malicious vtables to fully take control of the target device.

  • Go from zero-to-hero, building complex memory-corruption exploits in just 4 days
  • Build your own shellcode for Arm® 32-bit
  • Debug real world processes and write exploits for real-world IoT devices
  • Bypass exploit mitigations like ASLR, NX, Stack Canary, and so on
  • Learn about infoleaks and how to use them to bypass exploit mitigations
  • Reliably exploit the glibc heap and learn how to groom the heap
  • Use heap-overflows to build and use exploit primitives

Reverse Engineering

on 32-bit and 64-bit Arm

Learn to analyze compiled applications

  • Disassemble and debug real-world applications
  • Perform vulnerability discovery and learn about different vulnerability classes
  • Understand control flow of real-world applications
  • Learn to use disassembly tools like Ghidra, radare2, Frida, and GDB

Packed with practical labs and hands-on examples, the Azeria Labs Reverse Engineering course is designed to give students a deep understanding of Arm 32-bit and Arm 64-bit assembly, and to perform both static and dynamic analysis of compiled programs.

Our reverse-engineering courses are based around a series of reverse-engineering labs, including pure reverse-engineering of compiled binaries through to offensive-security-focused vulnerability discovery and vulnerability class hunting.

Our reverse-engineering courses are available only as private trainings. For more details, get in touch.

Android

Intro into Exploit Development

Get started on Android security and Arm 64-bit exploit development

This 3-day fast course is optimized for students just starting out in exploit-development or security engineering for Android on ARM.

Our course begins with a detailed introduction into the Arm 64-bit processor and assembly language, with labs covering more advanced shellcoding techniques targeted specifically at Android. Students will deploy their own shellcode as part of an attack against the Android device, and learn how to debug and develop complex functionality for use in their own exploits.

The second day of our course covers Android in more detail, looking at the Android security model, filesystem and permission model, and how to do invasive security auditing of Android user-mode applications, including labs on how to intercept encrypted network traffic and hook vulnerable functions in managed applications to look for exploitable vulnerabilities in the app.

Our final day covers theory and practice of patch-analysis and reverse-engineering. Students will use the Ghidra tool to reverse-engineer a patch for an Android 64-bit native application and use it to identify the security vulnerability that the patch fixes. We will learn how to identify similar vulnerabilities in binary analysis, and use a debugger to instrument and test the unpatched binary to trigger the bug.

Finally, students will develop a fully working exploit against the unpatched application, taking control of the target process via a complex mprotect ROP-chain to cause the process to run the shellcode written by the students on day 1.

This is the prerequisite course of our Advanced Android Exploit Development course where students learn now to turn multiple N-days into exploits, build and chain a kernel exploit to escalate privileges and more.

  • Develop and debug exploits on real Android devices
  • Construct your own Arm 64-bit shellcode
  • Turn multiple N-days into exploits
  • Write and chain multiple exploits together
  • Exploit a heap vulnerability to get on the device
  • Build and chain a kernel exploit to elevate privileges
  • and more!

Want to learn more about private trainings?

Cyber Defence Labs Private Trainings are available to corporate clients with minimum class sizes of 10 people. For detailed course outlines and price quotes, email info [at] cyber-defences.com from your company email account. Please note that private trainings are in high demand and must therefore be booked well in advance.