WEB APPLICATION & NETWORK INFRASTRUCTURE PENETRATION TESTING

Our cybersecurity expert instructors are experts in every sense of the word – they have a formidable reputation in the industry as real time cybersecurity gurus with decades of experience. All our classes are conducted LIVE with 100% Student Interaction. Our world class instructors, courseware and labs ensure that the students gain hands on Practical Knowledge and are not limited to theory alone. Come, Jupiter with us into a cybersecurity career!

Course Curriculum

  • Concepts
  • Lab setups
  • Introduction to ethical hacking
  • Reconnaissance | OSINT
  • Proxy’s and VPN’s- IP hiding
Web Applications Penetration Testing
  • SQLI- Authentication Bypass
  • Union Based Method
  • WAF Bypass Method
  • Error Based Method
  • Time Based Method
  • Boolean Based Method
  • Out of Band-SQLI
  • SQLI Automation – SQLMAP
  • Cross Site Scripting – XSS & types
  • XSS payloads working
  • Session Hijacking using XSS
  • Burpsuite- Manual & Automation
  • CSRF
  • File Upload Vulnerability
  • Web Labs – webgoat, multidae, bricks, Bwapp
  • XML eXternal Entity -XXE
  • SSRF
  • Insecure Deserialization
  • Access Control Vulnerabilities
  • API Pen Testing
  • Clickjacking
  • Web Application Scanner’s – Acunetix, OWASP ZAP
  • OWASP top 10 2013,2017,2021, SANS 25
  • Bug bounty
  • Web App Pen Testing Report Writing
Network Penetration Testing
  • Scanning
  • IP scanning
  • Port scanning
  • Vulnerability Scanning – Nessus
  • Penetration / Exploitation:
  • Penetrating windows XP
  • Penetrating windows 7
  • Penetrating metasploitable
  • Penetrating kioptrix level 1
  • Penetrating kioptrix level 2
  • Penetrating kioptrix level 3
  • Penetrating Mr. Robot
  • Penetrating windows 8 using MSFPC
  • Penetrating windows 10 using MSFPC
  • Red Teaming with Cobalstrike
  • Working with Exploit-DB,securityfocus,etc
  • Exploiting machines from Vulnhub& Hack The Box -HTB
  • Writing Penetration Testing Reports
  • PT Standards – PTES, MITRE ATT&CK
  • Man in the Middle Attacks
  • Phishing Attacks
  • Malware Attacks
  • Malware Analysis

We Provide

Networking

  • CCNA
  • CCNP
  • SOC

Servers

  • Windows Server 2012/16
  • Linux Server 6.0 & 7.0

Cloud

  • Amazon Web Service
  • Azure  and DevOps

Programs

  • Python and Advance Python
  • Hardware & Networking

TAKE THE NEXT STEP IN YOUR CAREER!