DIS10.2: Penetration Testing And Security Analyst Certification

Classroom Training & Online Training Available

DIS is the Globally trusted Brand in Information security and Ethical Hacking Training in world. DIS Consultants include group of Advanced Security

Enquire Now

DIS10.2: Penetration Testing and Security Analyst Certification (Level 2)

Course Description

DIS is the Globally trusted Brand in Information security and Ethical HackingTraining in world. DIS Consultants include group of Advanced Security Researchers from round the world who are real world Masters in Information Security. DIS is Providing Training via Live Classroom, Virtual Training Labs,Workshops,Webinars,Corporate Training’s, and Training’s via Dis Certified Training Centers (Authorized Training Partners).

DIS Courses are Developed and taught by real world Cyber Security Masters(CSM) from All round the World who are call DIS Consultants (Become a DIS Master Consultant Now). These Courses Provide Real world Hands on Practice sessions which are basically used in information security Field All over the World. DIS includes Course on Cyber Security and Ethical hacking, Penetration Testing and security Audit,Network and Data Forensics,In-depth Networking, Application Security on various Platforms. These Course are Highly preferred by Government Employees from various Intelligence Agencies.In addition to top-notch training we also provide you best Industry Course Material Specially designed by DIS Master Consultants. DIS features top Industry Certifications in Field of Cyber Security and Cyber Intelligence. .

COURSE MODULE (Download)  

Module 01:HOW TO PLAN YOYR PENERTRATION TESTNG

  • What is Penetration Testing?
  • Various Types of Penetration Testing
  • Best Industry Practices for Penetration Testing.
  • Tool-set required for Penetration Testing
  • Penetration Testing Check Lists (Very Important)

Module 02:SCOPING YOUR PENERTRATION TESTNG (CONTENT)
  • Scope of Penetration Testing
  • Information Gathering Using the Latest Reconnaissance Tools
  • Rules of Engagements
  • Detailed Reporting documents(Samples)
  • Search Engine Digging and Information Extraction

Module 03: NETWORK & WEB-APPLICATIONS SCANNING TECHNIQUES
  • What is Scanning?
  • What are the Best Tool sets for Scanning- Network Scanning Tool.
  • What are the Best Tool sets for Scanning- Web Application Scanning Tool
  • How to Use extract information from TCP Headers : TCP Dump.
  • Nmap Scripting Engine (Using them in your Pentest)
  • Nmap : Version Scanning/ OS Scanning/ Services Scanning/
  • Finding Vulnerability in Network : GFI / NessusP
  • Packet Crafting Tool : Scappy/ Colasoft Packet Builder
  • User Name Enumeration
  • Swizz Knife : Netcat(All in one tool)

Module 04: WEB APPLICATION Penetration Testing
  • Finding and Exploiting Cross-Site Scripting
  • Cross-Site Request Forgery
  • SQL Injection
  • Leveraging SQL Injection to Perform Command Injection
  • Maximizing Effectiveness of Command Injection Testing
  • Web Application Exploitation Using w3af/Acunetix/Burpsuite/Proxy application
  • How to use Burp Suite?
  • Capturing and replaying request and responses.
  • Various Modules in Burp like /sequencer/repeater/Dir scanning/splitting response
  • Finding and Exploiting Cross-Site Scripting
  • Cross-Site Request Forgery
  • SQL Injection
  • Performing Command Injection
  • Source Code Disclosure attack
  • Hidden form Field Exploitation Attacks

Module 5: NETWORK EXPLOITATION ATTACK VECTORS

  • Network Exploitation Tools
  • Understanding exploits/Payload.
  • In-dept Metasploiting Windows / Linus Systems
  • Metasploitable : Exercise
  • Using various Metasploit Modules like Exploits/Payloads/auxiliary
  • AV evasion Techniques in metasploit
  • In-Depth Meterpreter payload Using, Hands-On
  • Gaining Access to Target System using meterpreter Sessions.

Module 6: POST EXPLOITATION PHASE
  • Windows Hidden Commands.
  • Using Nc as a backdoor.
  • Attacking Passwords using word-list and Brute force/li>
  • Automated Password Guessing with THC-Hydra/John the ripper
  • Retrieving and Manipulating Hashes from Windows, Linux, and Other Systems

Module 7:IN DEPTH PASSWORD ATTACKS
  • Password Cracking with John the Ripper.
  • Password Cracking with Hydra
  • Sniffing and Cracking Windows Authentication Exchanges Using Cain
  • Dictionary Table Generation
  • Using Rainbow Tables to Maximum Effectiveness
  • Pass-the-Hash Attacks with Metasploit and More

Module 8: PENETRATION TEST REPORTING
  • Penetration Testing Deliverables and Conclusion
  • Penetration Testing Report and Documentation Writing
  • Penetration Testing Report Analysis
  • Post Testing Actions
  • Ethics of a Penetration Tester
  • Standards and Compliance


Contact For Details:

8130535445

 

Enquire Now

Contact us

Delivery Methods

  • Classroom Training
  • Online Training
  • Free Demo Class
  • Language English/Hindi

Related Courses

RedHat Courses:

Cisco Courses:

Workshops List


Batch Options

Weekday Classes

  • Monday to Friday
  • Duration : 2-3 Hours
  • Number of classes: 60-80 Hours(Instructor-Led Training))
  • 8:2 Practical Theory Ratio

Weekend Classes

  • Every Sunday and Saturday
  • Duration : 4 to 8 hours.
  • Number of classes : (60-80 Hours)
  • 8:2 Practical Theory Ratio
Our Office Location

Bytecode Cyber Security PVT LTD E-61, 3rd floor, Near Heera sweets, Laxmi Nagar,Delhi-110092
Landmark : Metro pillar no 46

Contact Number

+91-8130535445,011-45671678

Email Address

[email protected]

Website

COMPLETE PACKAGE DETAILS FOR INDIAN & INTERNATIONAL STUDENTS

  • Official Training by certified instructors
  • Head-2-Head training by Certified Subject matter experts
  • Highly interactive lectures, group exercises, and review sessions
  • 2 years membership of bytecode international training group
  • Chance to become country representative for bytecode
  • Certification Exam Fees Included.
  • Individual study environment
  • Training Environment
  • Practical live hacking
  • Concept based training
  • 24/7 High speed internet connectivity
  • Stay, food( breakfast, lunch and dinner)
  • Post training support after training & certification

Mode of Payment

  • NEFT/RTGS to:
    Bytecode HDFC



    Acc. Name : "Bytecode Cyber Security Pvt Ltd"
    Account No. :003705018009
    IFSC Code : ICIC0000037
    Swift Code : ICICNBBCTS

  • Cash/Cheque/Demand Draft Deposit to:
    Bytecode HDFC



    Acc. Name : "Bytecode Cyber Security Pvt Ltd"
    Account No. : 003705018009
    Branch :Preet Vihar
    IFSC Code : ICIC0000037
    Swift Code : ICICNBBCTS

  • Bytecode paypal

    Paypal Transfer :
    Our paypal account id is :
    [email protected]
    (Paypal payments will payable a surcharge of 4%.)

  • Bytecode credit_card

    Credit/Debit cards & Net Banking payments

    Bytecode paynowCC_LG

Bytecode Cyber Security PARTNERS / CLIENTS

Our GALLERY