Loading....

Penetration Testing

Objective of the Penetration Testing Course: 

This course includes in depth training to learn how to pentest modern infrastructures including servers and networks. It aims to give you a comprehensive understanding of pentesting complex applications running on Public and Private Cloud infrastructures.

penetration tedting

Our Penetration Testing course Includes:

Ethical Hacking 

  • Cyber Ethics-Hacking Introduction 
  • Information Gathering 1 
  • Information Gathering 2 
  • Scanning 1 
  • Scanning 2 
  • Virus, Worms  
  • Trojans & Backdoors 
  • Sniffers & keyloggers 
  • Proxy Servers & VPNs 
  • Social Engineering 
  • Email, DNS, IP spoofing 
  • HoneyPots 
  • System Hacking & Security 
  • Bots,Botnets & DOS 
  • Cryptography 

Website Hacking & Security 

  • Vulnerability Research 
  • SQL Injection 1 
  • SQL Injection 2 
  • XSS Attacks & Countermeasures 
  • Information Disclosure Vulnerabilities 
  • Buffer Overflow Attacks 1 
  • Buffer Overflow Attacks 2 
  • Session Hijacking Attacks 
  • Vulnerability Assessment & Penetration Testing 
  • OWASP top 10 vulnerability 

Information & Application Security 

  • Firewalls, IDS, Evading IDS 
  • Assembly Language Basics 
  • Metasploit Framework 
  • Reverse Engineering & Countermeasures 
  • Threat Hunting 
  • SIEM log reviews 
  • Incident Response 

Cyber Crime Investigation 

  • Introduction to Cyber Crime Investigation 
  • Handling Real World Cyber Crimes 
  • Investigating Cyber Pornography Crimes 
  • Cyber Forensics overview 

Click here to contact us and learn about all our trainings!

Learn more about our training program.

Get in touch today!

Back To Top