Cyber Gurukool
Learn Cybersecurity. Build Your Future.
Home
Our Courses
About Us
Contact Us
Home
Our Courses
About Us
Contact Us
Cloud VAPT
Brief Introduction to Cloud Architecture and Cloud Computing
Para-Virtualization and Fully-Virtualization (Hypervisor) Technology
Exploring
Openstack
Platform and
Openstack
Architecture
Installation Process of
Openstack
Platform and Exploring Horizon Web Interface
Installing Cloud Storage Server in Premise and in Public Cloud
Basic Configuration in Cloud Data Server and building a Trusted Pool
Brief Introduction to various Volumes related to Cloud Data storage Server
Creating LVM (Logical Volume Manager) for Cloud Data Storage
Shrinking and Expanding Volume in Cloud Data Storage
Creating Replicating Volumes and Creating Distributed- Replicating Volume
Storage Client, Native Client, CIFS (
Comman
Internet File System) Client in Data Storage Computing
Installation and Configuring Process of Virtualization Hypervisor
Managing Data
Center,role
of Data center in Cloud Technology world and Security Topology
Creating Thousand of Clusters in Cloud and Managing Cluster in Cloud
Examine Efficiency of Virtualization Hypervisor
Installation Process of Multiple Operating in
HyperVisor
Migration Process of Virtual Images From
HyperVisor
TCP IP packet Analysis
Advanced Sniffing Technique in Cloud
Network Traffic Image Capturing in Cloud
Pentesting
SSH Server in cloud
Vulnerability Analysis With Nessus – Nessus Vulnerability Scanner
Advanced Wireless Testing in Cloud
Wireless Penetration Testing in Cloud
MAC-Spoofing Technique
Designing a DMZ in Cloud
Snort Analysis in Cloud
Brief Introduction to Advanced Exploits and Tools in Cloud
AIDE (Advanced Intrusion Detection Environment) in Cloud
Securing System from IP-SPOOFING in Cloud
Penetration Testing Methodologies in Cloud
Customers and Legal Agreement
Rules of Engagement
Penetration Testing Planning and Scheduling in Cloud
Pre-penetration Testing Scheduling in Cloud
External Penetration Testing in Cloud
Internal Penetration Testing in Cloud
DNS Reconnaissance(Advanced DNS Reconnaissance)
Pentesting
Cloud IPV6 systems
DNS Penetration Testing in Cloud
Intercepting and Manipulation (Packet Crafting) of packets in cloud
Exploring Web Proxies and working Process
SSLSNIFF in Cloud Environment
Pentesting
NFS Server in Cloud and Securing NFS Server
Password Escalation and Cracking Technique
Implement SYN FLOOD and ICMP FLOOD
Advanced DDOS Attack on SSL(Secure Socket Layer-https)
Virus and Trojan Detection Technique
Penetration testing to Digital Certificate(Cryptography)
Securing data and Information and various Technology (Cryptography)
Exploring
HeartBleed
Vulnerability
Geo-Replication for Disaster Recovery in Cloud Environment
Brief Introduction to Cloud Architecture and Cloud Computing
Para-Virtualization and Fully-Virtualization (Hypervisor) Technology
Exploring
Openstack
Platform and
Openstack
Architecture
Installation Process of
Openstack
Platform and Exploring Horizon Web Interface
Installing Cloud Storage Server in Premise and in Public Cloud
Basic Configuration in Cloud Data Server and building a Trusted Pool
Brief Introduction to various Volumes related to Cloud Data storage Server
Creating LVM (Logical Volume Manager) for Cloud Data Storage
Shrinking and Expanding Volume in Cloud Data Storage
Creating Replicating Volumes and Creating Distributed- Replicating Volume
Storage Client, Native Client, CIFS (
Comman
Internet File System) Client in Data Storage Computing
Installation and Configuring Process of Virtualization Hypervisor
Managing Data
Center,role
of Data center in Cloud Technology world and Security Topology
Creating Thousand of Clusters in Cloud and Managing Cluster in Cloud
Examine Efficiency of Virtualization Hypervisor
Installation Process of Multiple Operating in
HyperVisor
Migration Process of Virtual Images From
HyperVisor
TCP IP packet Analysis
Advanced Sniffing Technique in Cloud
Network Traffic Image Capturing in Cloud
Pentesting
SSH Server in cloud
Vulnerability Analysis With Nessus – Nessus Vulnerability Scanner
Advanced Wireless Testing in Cloud
Wireless Penetration Testing in Cloud
MAC-Spoofing Technique
Designing a DMZ in Cloud
Snort Analysis in Cloud
Brief Introduction to Advanced Exploits and Tools in Cloud
AIDE (Advanced Intrusion Detection Environment) in Cloud
Securing System from IP-SPOOFING in Cloud
Penetration Testing Methodologies in Cloud
Customers and Legal Agreement
Rules of Engagement
Penetration Testing Planning and Scheduling in Cloud
Pre-penetration Testing Scheduling in Cloud
External Penetration Testing in Cloud
Internal Penetration Testing in Cloud
DNS Reconnaissance(Advanced DNS Reconnaissance)
Pentesting
Cloud IPV6 systems
DNS Penetration Testing in Cloud
Intercepting and Manipulation (Packet Crafting) of packets in cloud
Exploring Web Proxies and working Process
SSLSNIFF in Cloud Environment
Pentesting
NFS Server in Cloud and Securing NFS Server
Password Escalation and Cracking Technique
Implement SYN FLOOD and ICMP FLOOD
Advanced DDOS Attack on SSL(Secure Socket Layer-https)
Virus and Trojan Detection Technique
Penetration testing to Digital Certificate(Cryptography)
Securing data and Information and various Technology (Cryptography)
Exploring
HeartBleed
Vulnerability
Geo-Replication for Disaster Recovery in Cloud Environment
Shopping Basket