Manage All Your Website issues
With A Single Partner
SEO Complete Training Course
SEO (Search Engine Optimization) factors on how to reach top spot on Google search with Search Engine Optimization.
Master Technical SEO factors – The entry ticket to search Engines.
Make your website load in less than a second. The interesting part of this section is, your page speed insights score will up to 100 /100 for desktop and 100 / 100 for mobile
Get indexed by search engines faster
. Implement the best User experience for your visitors / customers – The future SEO factor. Reduce user abandonment rate and increase user’s time spent on your site
Learn Keyword Research in SEO – Get targeted traffic to your site, by using the chosen transactional / informative long tail keywords
All backlink myths demystified – Learn the important attributes of backlinks and ignore the ones that don’t work anymore.
Protect your website against Negative SEO – It’s not a black hat SEO. This is your line of defense against negative SEO attacks
Graphic Design Complete Course
This is an exploratory mini-class added to the Graphic Design Masterclass course
Print & Editorial Design
Pattern Design and Illustration
Social Media/Digital Graphic Designer
By the end of this class you will have a solid grasp of what each design niche entails. You will have confidence in choosing your top three focal niches to kickstart or enhance your design offerings and know what to learn next.
Digital Marketing Complete Course
12 Courses in 1 Covering 12 major online marketing topics.
Market Research. Ask 3 simple questions to validate your business idea.
WordPress. Build a world-class website in 1 hour without any coding.
Email Marketing. Build a mailing list of 1000 people in 30 days from scratch.
. Write sales pages that make the cash register ring!
SEO (Search Engine Optimisation). Get free traffic to your website with SEO.
YouTube Marketing. Drive traffic & sales with simple “how to” videos.
Social Media Marketing (Instagram, Facebook, Twitter, Pinterest & Quora).
Linkedin Marketing. Go viral on Linkedin and 400x your connections.
App Marketing. Discover 43 Ways To Promote Your App.
Google Adwords. Avoid common mistakes and set up profitable campaigns first time.
Facebook Ads. Make money with Facebook Ads without spending a fortune.
Google Analytics. Improve your marketing with Google Analytics data.
By the end of this course, you will be confidently implementing marketing strategies across the major online marketing channels.
All the strategies, tips and tools recommended are either free or very cost effective.
Ethical Hacking Complete Course
Start from 0 up to a high-intermediate level.
- Learn ethical hacking, its fields & the different types of hackers.
- Install a hacking lab & needed software (on Windows, OS X and Linux).
- Hack & secure both WiFi & wired networks.
- Understand how websites work, how to discover & exploit web application vulnerabilities to hack websites.
- Use 30+ hacking tools such as Metasploit, Aircrack-ng, SQLmap…..etc.
- Discover vulnerabilities & exploit them to hack into servers.
- Hack secure systems using client-side & social engineering
- Secure systems from all the attacks shown.
- Install & use Kali Linux – a penetration testing operating system.
- Learn linux basics.
- Learn linux commands & how to interact with the terminal.
- Learn Network Hacking / Penetration Testing.
- Network basics & how devices interact inside a network.
- Run attacks on networks without knowing its key.
- Control Wi-Fi connections without knowing the password.
- Create a fake Wi-Fi network with internet connection & spy on clients.
- Gather detailed information about networks & connected clients like their OS, ports …etc.
- Crack WEP/WPA/WPA2 encryptions using a number of methods.
- ARP Spoofing / ARP Poisoning.
- Launch various Man In The Middle attacks.
- Access any account accessed by any client on the network.
- Sniff network traffic & analyse it to extract important info such as: passwords, cookies, urls, videos, images ..etc.
- Intercept network traffic & modify it on the fly.
- Discover devices connected to the same network.
- Redirect DNS requests to any destination (DNS spoofing).
- Secure networks from the discussed attacks.
- Edit router settings for maximum security.
- Discover suspicious activities in networks.
- Encrypt traffic to prevent MITM attacks.
- Discover open ports, installed services and vulnerabilities on computer systems.
- Hack servers using server side attacks.
- Exploit buffer over flows & code execution vulnerabilities to gain control over systems.
- Hack systems using client side attacks.
- Hack systems using fake updates.
- Hack systems by backdooring downloads on the fly.
- Create undetectable backdoors.
- Backdoor normal programs.
- Backdoor any file type such as pictures, pdf’s …etc.
- Gather information about people, such as emails, social media accounts, emails and friends.
- Hack secure systems using social engineering.
- Send emails from ANY email account without knowing the password for that account.
- Analyse malware.
- Manually detect undetectable malware.
- Read, write download, upload and execute files on compromised systems.
- Capture keystrokes on a compromised system.
- Use a compromised computer as a pivot to hack other systems.
- Understand how websites & web applications work.
- Understand how browsers communicate with websites.
- Gather sensitive information about websites.
- Discover servers, technologies & services used on target website.
- Discover emails & sensitive data associated with a specific website.
- Discover subdomains associated with a website.
- Discover unpublished directories & files associated with a target website.
- Discover websites hosted on the same server as the target website.
- Exploit file upload vulnerabilities to gain control over target website.
- Discover, exploit and fix code execution vulnerabilities.
- Discover, exploit & fix local file inclusion vulnerabilities.
- Discover, exploit & fix SQL injection vulnerabilities.
- Bypass login forms and login as admin using SQL injections.
- Exploit SQL injections to find databases, tables & sensitive data such as usernames, passwords…etc
- Read / Write files to the server using SQL injections.
- Learn the right way to write SQL queries to prevent SQL injections.
- Discover reflected XSS vulnerabilities.
- Discover Stored XSS vulnerabilities.
- Hook victims to BeEF using XSS vulnerabilities.
- Fix XSS vulnerabilities & protect yourself from them as a user.
- Discover MITM & ARP Spoofing attacks.
Limited Period Offer!!!
Worth Rs.1859/- free with the course
This course is completely for education purpose only.
Our focus is to integrate digital technology into all business areas changing how our clients operate their business and deliver top value to their customers.Technical Guru is a group of consultant working smartly to help clients achieve their business goal by creating strategies based on the current trends and ensuring that our Clients are satisfied with our servies.
Address 114 A Maharani bagh
Ashram, New Delhi 110014