H | VAPT (Vulnerability Assessment and Penetration Testing)
With the help of our Vulnerability Assessment and Penetration Testing (VAPT) course, which will provide you the specialized skills necessary to proactively detect and address security flaws in contemporary IT infrastructures, take a dynamic trip into the field of cybersecurity.
Module 01 : Vulnerability Assessment & Penetration Testing Concepts
Introduction of VAPT and Types of Testings
CIA Triad and Risk Assessment
Offensive and Defensive Face of Penetration Testing
VAPT Methodology And Phases
Incident Response
Preparation for Penetration Testing Live test case
Cyber Security Teams
Types of teams Red,Blue And Purple
Identify weaknesses using Vulnerability Assessment tools
Vulnerability Research Tools
Research Powerful Exploit tools
Module 02: Networking Concepts
Introduction of Networking
Network Methodologies , Network Medias and Network Topologies
Ipv4 Vs Ipv6
OSI reference model and tcp 3 way handshake
Firewalls and types , IDS/IPS and Honeypots
Module 03: Networking Scanning
Discover Network Connected Devices & Servers
Local area network Services Scanning
Nmap Network and Service enumerations
NetCat (Service Enumerations)
NSE Scripts for Vulnerability Analysis
Different Port Scanning Techniques
Firewall/IDS evasion Technique
Discover and Exploit services using Auxiliary
Module 04: Vulnerability Assessment
Fundamentals of Vulnerability Assessment
Analyzing Vulnerabilities and Exploits
Vulnerability Analysis using various tools
Testing Exploit on Vulnerabilities
Configuring Scanners and Generating Reports
Assessing Risks in a Changing Environment
Managing Vulnerabilities
Module 05: Penetration Testing
Introduction to Penetration Testing
Introduction to Kali Linux
Scanning Networks
System Penetration Testing
OSINT Penetration Testing Methodology
Penetration Testing Plan Template
Module 06: Metasploit
Staged vs. Non–Staged Payloads
Meterpreter Payloads
Experimenting with Meterpreter
Reverse HTTPS Meterpreter
Metasploit Exploit Multi Handler
Revisiting Client-Side Attacks
Meterpreter and post-exploitation
Client-side Exploitation
Module 07: Antivirus Evasion
Encoding Payloads with Metasploit
Crypting Known Malware with Software Protectors
Using Custom/Uncommon Tools and Payloads
Module 08: Operating System Escalating Privileges
Understanding OS Kernel and File System
Cracking Operating System Captured hash
Dump Cleartext Password from memory
Bypass Guest and Local Account Privileges
Understanding PS tools for Windows Pentest
Many OS Escalating Privileges Exploits test case
Links
Contact Info
- +91 9920955055
- contact@hackanics.com
- Mumbai , Pune , Bangalore, Udaipur , Jaipur
Sign up for Newsletter
Hackanics copyright © 2024. All Rights Reserved.