Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Start: About Anfeidrol

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

7-DAY BOOTCAMP

1
About
Anfeidrol is an educa�on venture
of BoredProgrammers Pvt. Ltd.
It is a leading learn-tech startup
pla�orm that provides live and
Anfeidrol interac�ve instructor-led online
training.
We also cater na�onwide to professionals and
students who seek offline hands-on knowledge
through our workshops and summer/winter
training.

7-Day Bootcamp, consis�ng of


21 hours of project-oriented
training on your favourite module.
2 About
Bootcamp comes with life-�me Bootcamp
access to the videos and materials
used during the course.
We have expert trainers for each module in every
par�cular Bootcamp, which means you’ll be
ge�ng training from mul�ple trainers who are
skilled and trained in their niche.

3 Bootcamp cer�ficate will be in


associa�on with our Educa�on
and Cer�ficate Partners,
Certificate Adobe, BoredProgrammers,
Partners EC-Council, HPE and Microso�.

Bootcamp cer�ficate will be


cer�fied from top colleges and
ins�tu�ons including, IIT Ropar,
IIIT Lucknow, and Assam
4
College
Engg. College. It’s in associa�on Partners
with their respec�ve tech-fests.

5 All par�cipants would be awarded


with a verifiable cer�ficate of
merit, based on the
Perks & bootcamp-end exam. You’re also
Goodies eligible for tech and SWAG
goodies.
Further, perks of enrolling includes, Internship
opportuni�es with BoredProgrammers and
partner companies. Each par�cipant would be
provided with 100% Interview and Job Assistance. START
Best of Luck for Your Bootcamp
Start with a Good Vibe
DO NOT COPY
1
DAY 1.1

1st Milestone begin


Introduction to EH & CS
Indian Cyber Law
Introduction to Pentesting | Bug hunting | CTF DAY 1.2
Practical Implementation of Data -Hiding
Pathway of our Learnings
PDF & Ebooks for our bootcamp

DAY 1.3
Enumeration Techniques & Scannings
Covering tracks in Steganography | Implementation

2nd Milestone begin


3

anfeidrol.com
4
DAY 2.1
Introduction to Networking
CCNA | Routing
CCNA | Switching
Practical Implementation of R & S
DAY 2.2
Logic Behind Google Server | Implementation
Testing IP & Domain for website | Router
VPN | R & S
Security on Networks | Firewall | IDS

5
6

DAY 2.3
Logic Behind Wi-Fi | Detailed Version
Practical Implementation of Wi-Fi on Cisco PT
Introduction to OS

7
8 DAY 3.1
DAY 3.2 Concept of Virtualization
Setting Up our Hacking Machine
3rd Milestone begin

Introduction to Attacks Setting Up our Hacking Tools Required


Types of attacks with Demo
Practical Implementation of Cybar Attacks
Security | Implementation

Anfeidrol.com | Boredprogrammers.com help@boredprogrammers.com


DO NOT COPY
DAY 3.3
Capturing Keys | Keyloggers
Practical Implementation of Keylogger | Creation
Introduction to cloning | Website cloning
Phishing | Practical Demonstartion
9
4th Milestone begin
DAY 4.1
Introduction to Login Password Hacking
Demonstration of Win XP | Win 7 Hacking
Logic Behind Password Cracking | Hacking

10
URL Attacks | URL Hiding | Masking

DAY 4.2
Security for both Windows XP | 7
Login Password for Win 10 hacking | all types
Bios Hacking
Windows 10 Security | Bios Security | System Security

11

anfeidrol.com
12
DAY 4.3
Cool Hacking Tricks | list
SMS Flooding | DND Flooding
EMAIL Tracing | Work Implementation
Call flooding | Number Masking
DAY 5.1 5th Milestone begin

Introduction to System Hacking with Internet


Introduction to System Hacking without Internet
Internet Data Hacking | Local Networks | Network Sharing Controls

13
14

DAY 5.2
Introduction to Virus
Practical Implementation of Virus
Advance Virus for Systems | Worms

6th Milestone begin


15
16 DAY 5.3
DAY 6.1 Human Interaction
Without Interaction
Introduction to Smartphones
Security Virus | Worms | Backup Drives
Smartphone Hacking Demonstartion

Anfeidrol.com | Boredprogrammers.com help@boredprogrammers.com


DO NOT COPY
DAY 6.2
Google Hacking |Dorks
WebCam Hacking Through IP | Sub IP
Database searching Techniques
Security to all Types of DB
17
DAY 7.1
Brief of Wi-Fi & Limitations
Wi-Fi Hacking | WPS | WPA | WPA2
Wireless Security
7th Milestone begin

18

DAY 7.2
Introduction to DB | Attacks | Website Hacking
SQL attacks | Data Retrive Process
SQL attack tools

19

anfeidrol.com
20
DAY 7.3
Introduction to data
Data Deletion | Process | Workflow
Data Recovery | Forensic
ONE method to protect all your systems

END
Learning Never Ends
This is the END of Bootcamp Only
Best of Luck for Your Bootcamp Exam*
Thank You

Anfeidrol.com | Boredprogrammers.com help@boredprogrammers.com

You might also like