Course by:

Course Highlights

  • Unique certification program, approved by AICTE (under NEAT2.0), provides essential knowledge on penetration testing techniques, vulnerability assessment, ethical hacking and reporting.
  • Job Roles-
    • Penetration Testing
    • Vulnerability Assessment
    • Ethical Hacking
  • Eligible for GOVT. OF INDIA Incentives
  • Skill Type

  • Course Duration

  • Domain

  • GOI Incentive applicable

  • Course Category

  • Nasscom Assessment

  • Placement Assistance

  • Certificate Earned

  • Content Alignment Type

  • NOS Details

  • Mode of Delivery

Course Details

Learning Objectives

What will you learn in ISAC Certified Penetration Tester course?

  • Knowledge and skills on vulnerability analysis and penetration testing.
  • Process and methodology to conduct penetration testing.
  • Tools and techniques to conduct vulnerability assessment.
  • Analysis and reporting.
Read more
Reasons to enrol

Why you should take ISAC Certified Penetration Tester course?

  • The course prepares the candidate to conduct penetration testing, vulnerability assessment and ethical hacking.
  • Paves the way for the candidate to conduct security audits and aid the process of compliances.
  • Prepares the candidate to efficiently report on the vulnerabilities.
  • The course highlights with practical hand-on training with exposure to real world scenarios.
Read more
Ideal Participants

Who should take ISAC Certified Penetration Tester course?

  • Students and Professionals keen on learning penetration testing and web-app & ethical hacking
  • Professionals who wish to become penetration testing trainers
  • Software developers
Read more
Curriculum

Curriculum

  • Types of Hackers, Setting up Hacking Environment
  • CIA Triad
  • Linux Basics - Linux Commands, MAC Changer, Linux File Structure
  • Networking, OSI Model, TCP/UDP Model, TCP/IP Model
  • Ports and Services such as SSH FTP HTTP HTTPS SMTP, Nmap & Nmap Scripts
  • Wireshark, Honeypots, Linux Run Levels, Linux Permissions
  • Basics of Bash Scripting, Netcat
  • Symmetric Encryption, Asymmetric Encryption
  • Hashing, Encoding Decoding, Steganography Steghide, Wordlists, Creating Custom Wordlists using Crunchbase
  • Hydra for Password Cracking
  • John the Ripper
  • Metasploit for SSH password cracking
  • Cyber Chef
  • Rainbow Tables
  • Different types of Malwares, Bombs
  • Dos and DDos Attacks
  • Deepweb & Darkweb
  • TOR
  • Onion Websites
  • Introduction and creating payloads using Metasploit
  • Reverse Listeners
  • Exploiting Windows System
  • OWASP Top 10
  • 2013 v/s 2017 v/s 2021
  • Installation of Burp Suite
  • What is HTTP Request, HTTP Methods
  • Status Codes
  • CVSS
  • Reflected XSS, Stored XSS, DOM XSS
  • SQL Injection
  • Command Injection
  • Bruteforcing
  • Content Security Policy
  • Security Headers
  • Basic Authentication Attacks
  • Google Dorking
  • Shodan
  • Censys
  • The Harvester
  • Whois Enumeration and Reverse Whois
  • DNS Enumeration
  • Waybackurls
  • Tips & Tricks
  • CTF Solving Approach
  • Pentest Reports
Read more
skills and tools
!~mcd_text_data_6~!
Read more