Current Status

Not Enrolled

Price

Free

Get Started

PENTESTING TRAINING

Course Content

PREREQUISITES BEFORE GETTING STARTED
Prerequisite – SETUP PEN TESTING LAB WITH VIRTUAL MACHINES
Module 01 - INTRODUCTION TO PENETRATION TESTING
Lecture 01 – UNDERSTANDING PENETRATION TESTING
Lecture 02 – LEGAL ASPECTS AND ETHICAL CONSIDERATIONS
Lecture 03 – PENETRATION TESTING METHODOLOGIES
Module 02 - NETWORKING AND INFORMATION GATHERING
Lecture 01 – BASIC OF NETWORKING
Lecture 02 – NETWORK PROTOCOLS
Lecture 03 – SECURITY IN NETWORKING
Lecture 04 – TECHNIQUES FOR ACTIVE AND PASSIVE
Lecture 05 – BASIC COMMAND ARGUMENTS FOR NMAP
Lecture 06 – WIRESHARK NETWORK ANALYZER
Module 03 - SYSTEM EXPLOITATION
Lecture 02 – EXPLOITATION TOOL – METASPLOIT FOR SYSTEM
Lecture 03 – EXPLOITATION TOOL – BURP SUITE FOR WEB APPLICATION
Lecture 04 – PRIVILEGE ESCALATION AND PERSISTENCE
Module 04 - WEB APPLICATION PENETRATION TESTING
Lecture 01 – WEB TECHNOLOGIES – HTTP, SSL/TLS AND COOKIES
Lecture 02 – SQL INJECTION, XSS AND CSRF
Lecture 03 – AUTOMATED AND MANUAL TESTING TOOLS
Module 05 - WIRELESS SECURITY TESTING
Lecture 01 – WEP, WPA AND WPA2
Lecture 02 – KNOWN WIRELESS TECHNOLOGIES
Lecture 03 – TOOLS FOR WIRELESS TESTING
1 of 2
Scroll to Top