In 2019, cyber-crimes costs businesses $ 2.1 Trillion globally. Categorically, small businesses face 70% of cyber-crimes, among which 49% of companies fail to monitor such attempts. The likability of reviving from a critical hack is so slim that 60% of companies are out of business in less than 6 months.
Manish Bhardwaj designed ASCPT – Azure Skynet Certified Penetration Tester training program. In a way that it offers skills and knowledge on different penetration testing across different verticals.
This Penetration Testing Training equips you with the innovative cyber security solutions for applications & IT infrastructure threats and helps you keep your cyberspace secure at all times. It applies a systematic approach to uncover vulnerabilities that leave critical assets at risk of the enterprises nowadays.
It is essential to understand how hackers penetrate your network easily. This training helps you in creating a penetration free network and webspace.
Pre-Requisites:
Basic knowledge of computers & internet technologies with a curious mind.
Take Away Kit:
- Participants clearing final exam with more than 70% marks will be awarded with ASCPT (Azure Skynet Certified Penetration Tester) Certificate.
- Participants will get a participation certificate and a training completion letter.
- Participant will get toolkit consisting of tools used during training, cookbook, videos and other software (30+GB).
- Candidates will be provided with an Azure Skynet Cyber Security Reference Book.
WHY AZURE SKYNET ?
- Hands On Practical Sessions
- 24×7 Lab Facility Available
- New & Advance Training Methodology
- Project Development in Industrial Environment
- Tie-up with the most prestigious IITs
To apply for the training program, kindly fill the enquiry form else mail us at [email protected] or call/whatsapp at 7840042113.
- Track
- Days
- Duration
- Hours
- Training Fee(INR)
- Regular Track
- Mon-Fri
- 30 Days
- 2 hrs/day
- 30,000
- Weekends
- Sat-Sun
- 6 Weekends
- 3 hrs/day
- 30,000
INSTALLING AND CONFIGURING KALI LINUX
Introduction
Creating Virtual Machine
Installing Kali Linux/BT5
Installing Extra Tools on Kali
Configuring SSH
Scanning System for Rootkit
PRE-PENETRATION TESTING CHECKLIST
Introduction to Scope
Metrics for Time Estimation
Scoping Meeting
Additional Support Based on Hourly Rate
Questionnaires
LINUX FUNDAMENTALS
Various commands
Directories
Chmod(permissions)
NetCat
Crontab
PROGRAMMING
Bash Basics
Python Basics
HTML
PREPARING A TEST ENVIRONMENT
Introducing VMware Workstation
Installing VMware Workstation
Installing vulnerable machines
INFORMATION GATHERING
Gathering Information Checklist
Visiting the Client Website
Google Hacking Database
Using some tools on the WEB
Trying Metagoofil to Gather Documents Information
Gather Contacts Information
Whois
DNS Reconnaissance
DMITRY
Discover Script
Recon-ng
EXTERNAL PENTESTING
External Penetration Testing Workflow
Traceroute
Host Discovery
Port Scanning
WEBSITE PENETRATION TESTING
Website Penetration Testing Workflow
Web Application Firewall Scan
Load Balancer Scan
Website crawling
Burpsuite
Copying website
SSL Scanning
CMS Scanning
Scanning for Web specific vulnerabilities
Sessions Token Test
Exploiting the SQL Injection
Denial of Service
OWASP TOP 10
INTERNAL NETWORK PENETRATION TESTING
Internal Penetration Testing Workflow
Port Scanning the Internal Network
Scanning for vulnerabilities
NETWORK SNIFFING
Network Monitoring
Sniffing with wireshark
Detecting MITM
Detecting SYN Scan
Understanding Brute Force Attack
Discovering a Denial of Service
IDS & its weakness
IPS & its weakness
Honeypots
EXPLOITATION
Exploiting Using Metasploit
Post Exploitation in Metasploit
Persistence (NC)
Using Meterpreter
Armitage
SOCIAL ENGINEERING
Powershell Attack
Spear Phishing Attack
Credential Harvester
WIFI PENETRATION TESTING
Wireless Reconnaissance
WEP Attack
WPA/WPA2
Bypassing Hidden ESSID
BRUTE FORCE ATTACK TESTING
Brute Forcing SSH
Brute Forcing RDP
Brute Forcing Webforms Authentications
Cracking the Hashes
ADVANCED PENETRATION TESTING
Introduction
Bypassing the Antivirus
Finding Exploits
Attacking the domain controller
POST EXPLOITATION
Understanding Post Exploitation
Analyzing Network configuration
Pivoting
Analyzing Network Services
REPORTING
Overview
Report Structure
The Executive Summary
Technical Report
Azure Skynet
M-4, 1st Floor, Old DLF Colony, Sector 14, Gurgaon, Haryana, India.
+91 7905152264
0124-4275997