- Information Security
- VAPT
- SIEM
- McAfee Nitro
- Splunk
- UF-Installation on Linux
- UF-Installation on Windows
- Splunk Instance Installation
- UF & Receiver Configuration
- HF & Receiver Configuration
- Deployment Server & Client Configuration
- Distributed Search Setup
- Indexer Clustering
- Search Head Clustering
- SH Clustering with Non-clustered Indexer
- SH Clustering with Clustered Indexer
- Splunk Fundamental 1
- Splunk Fundamental 2
- Regular Expression
- Computer Networking
- TCP/IP Vs OSI
- Networking Fundamentals
- Subnetting
- About CISCO Router
- Layer-2 Switching
- Virtual LAN
- Trunking
- Inter VLAN
- Extended & Voice VLAN
- VLAN Trunking Protocol
- Spanning Tree Protocol
- Ether Channel
- Layer-3 Routing
- Static Routing
- Default Routing
- Routing Information Protocol
- Enhanced Interior Gateway Routing Protocol
- Open Shortest Path First
- Access Control List
- Network/Port Address Translation
- WAN Technologies
- Leased Lines
- Frame Relay
- Metro-Ethernet
- Multi Protocol Label Switching
- Virtual Private Network
- Cyber Security Attacks
- WAPT
- Information Gathering(WEB)
- Cookies & Session Management
- SQL Injection
- Cross Site Scripting
- Cross Site Request Forgery
- Insecure Direct Object Request
- Command Injection
- HTML Injection
- File Upload
- URL Redirection
- Local & Remote File Inclusion
- HTTP Authentication
- Web Shells
- Encoding Methods
- Firefox Addons
- Python
- CTF Challenge