fbpx skip to Main Content
09864032319 , 09678176577 datacomes@gmail.com

Our penetration testing training is the Information Security industry’s most comprehensive penetration testing training . This is  the advanced level of Ethical Hacking in which the personnel evaluates security of IT network or corporate websites by simulating an attack from external threats and internal threats and recommend corrective measures authoritatively. This analysis is carried out from the position of a potential attacker and can involve active exploitation of security vulnerabilities. This  is the only course available in Guwahati, Assam which helps students and professionals to become  best penetration tester with technical skills, tools and techniques that they can use to improve the security of any organization.This training will train students on the five key elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting.

Course Duration: 3 months

Syllabus:

  •  IP and Malware
  •  IP Analysis
  •  Types of Malwares
  •  Foot-Printing Techniques
  •  Information Gathering
  •  ICANN Guidelines
  •  Hosting Servers
  •  Registrant and Hosting Panels
  •  Static and Dynamic Websites
  •  Pre-Penetration Steps
  •  Information Scanning
  •  Hacking using Google
  •  Finding Control Panel of Websites
  •  Breaking Cpanels
  •  Attacking Systems
  •  Windows Hacking
  •  Phishing
  •  Session Hijacking
  •  Password Cracking Penetration Testing
  •  Web Foot-Printing
  •  DNS Hijacking
  •  Sub-Domains Scanner
  •  Information about target on Web App
  •  Webserver Hacking
  •  Metasploit
  •  Privilege Escalation Attack
  •  Rooting
  •  Shellcoding
  •  Encryption / Decryption
  •  Web Application Penetration Testing
  •  Social Engineering Penetration Testing
  •  XSS Attacks
  •  Persistent and Non-Persistent Attacks
  •  CSRF
  •  Securing XSS Attacks
  •  SQL Penetration Testing
  •  Blind SQLi
  •  Attacks on SQL Server
  •  Securing SQLi
  •  Database Penetration Testing
  •  Different types of CMS identifications
  •  Attacks on CMS
  •  Joomla Exploits
  •  Wordpress Exploits
  •  Vbulletin Exploits
  •  Wireless Penetration Testing
  •  WEP and WPA Attacks
  •  Security Measures
  •  LAN Penetration Testing
  •  Client Side Exploits
  •  MITM Attacks
  •  Sniffing Attacks (http, https)
  •  Trojans, Virus and Backdoors Detection
  •  Vulnerability Assessments
  •  Vulnerability Assessment tools (acunetix, dvwa)
  •  Testing Reports and Post Testing Actions
  •  Standards and Compliance
  •  Cyber Law and Acts
  •  CERT-IND and AO
  •  Cyber Forensics and Investigations
Back To Top