Overview


The aim of this course is to introduce the industrial methodologies which are used in organizations for Vulnerability Assessment and Penetration Testing. This course majorly concentrates on the Server and Application VAPT.

Enquiry Form

Submit



Course Content

Course Content


  • Module1: Linux:
  • Linux
  • Commands/Scripts in Linux
  • Directories & Working Directory
  • Package Manager
  • Java/Python/Perl Scripts
  • Commands
  • Unix permissions
  • Module2: Network:
  • How Does the Internet Work?
  • Protocols and Ports
  • OSI layers - Protocols
  • Devices VAPT
  • DNS
  • VPN
  • Module3: Network Penetration Testing:
  • Information Gathering
  • Discovery: dnsrecon amass total recon-angry ip-nmap
  • Service Enumeration
  • Finding known vulnerabilities for services: understand a service with google-nvd-exploit db
  • Exploiting Vulnerabilities
  • Report Writing
  • Module4: Application:
  • Websites
  • Application Server
  • Web Server
  • Database Server
  • Encryption
  • Decryption and Hashing
  • HTTP methods
  • HTTP headers
  • Cookies
  • Status Codes
  • Module5: Application Penetration Testing:
  • Information Gathering
  • Burp Introduction
  • Owasp Top Ten - 2017
  • Mobile Application Testing
  • Report Writing

Learning is a weapon of Destroying Our Illness....