ISAC Certified Penetration Tester certification is a recognised empanelment program for information security professionals with hands-on proven experience in vulnerability analysis and penetration testing.
The program is a foundation for many other job roles including Security Information and Event Management (SIEM), Computer Forensics, Web Application Security, ISO 27001 Compliance, PCI-DSS, Internal IT Security Audit etc. The course includes:
01 Video sessions
You get access to pre-recorded video sessions with detailed explanation of tools and methods
02 Live sessions
In addition, you also get trainer led sessions to better understand and cement your learning
03 Virtual Labs
Practice your skills in a safe environment with online virtual labs provided by Cyberange – Over 500+ Hands-on Labs!
04 Reading material
Get access to reading material, also in audio form for ease of learning and understanding
Select a plan which best suits you and earn your National Security Database Certification
If you have a sound knowledge of linux based systems and would like to take your skillset to the next level, this plan is for you
For all students who clear the Falcon level
Connect with the best minds in Infosec domain
Empanelment from NSD means faster job opportunities
Get support for job interviews on successfully clearing the lab exams
With 30 days of Virtual labs, you will have proven hands-on skills to handle your next big job
Introduction
• Types of Hackers
• CIA Triad
• Computing Hands on
• Some Basic Terminologies
• Setting Up your Hacking environment
Networking
• OSI Model
• TCP/UDP Model
• TCP/IP Model
• Ports and Services such as SSH FTP HTTP HTTPS SMTP
• Nmap & Nmap Scripts
• Wireshark
• Honeypots
Linux Basics and Shell Scripting
• Basic Linux Commands
• Linux Booting Process
• Linux Run Levels
• Linux File Structure
• Linux Permissions
• Basics of Bash Scripting
• Netcat
Cryptography and Steganography
• Symmetric Encryption
• Asymmetric Encryption
• Hashing
• SSL TLS
• Encoding Decoding
• Steganography and different types
• Steghide
Password Cracking
• Wordlists
• Creating Custom Wordlists using Crunchbase
• Hydra for Password Cracking
• John the Ripper
• Metasploit for SSH password cracking
• Cyber Chef
• Rainbow Tables
Malwares and Trojans
• Different types of Malwares
• Different Types of Bombs
• Dos and DDos Attacks
• MAC Changer
• Deepweb & Darkweb
• TOR
• Onion Websites
System Hacking
• Introduction to Metasploit
• Creating payloads using Metasploit
• Reverse Listeners
• Linux and Windows Exploits
• Uploading a Backdoor
Android Hacking
• Attack Killchain
• Android Hacking
• Android Hacking with backdoor
Social Engineering Attacks
• Different Social Engineering Attacks
• Phishing and Types with Practical
• IDN Homograph Attack
• Email Spoofing
• ShellPhish
• Social Engineering Toolkit (SET)
WiFi Hacking
• Introduction
• Rogue Access Point
• WPA2 Cracking
Introduction to Web Pentesting
• OWASP Top 10
• 2013 v/s 2017 v/s 2021
• CVSS
• Introduction to Bug Bounty
• Installation of Burp Suite
• Basic Authentication Attacks
• SQL Injection
• XSS
• Session Hijacking & Fixation
Information Gathering
• Google Dorking
• Tools
• The Harvester
• Whois Enumeration
• DNS Enumeration
• Black Widow
• Sherlock
• Subdomain Enumeration
IoT Search Engines & Reconnaissance
• Shodan
• Censys
• Reverse Whois
• Waybackurls
• Github Dorking
• Tips & Tricks
• Capstone Project
With over 20,00,000 jobs available in India alone, it is increasingly becoming difficult for companies to find good cybersecurity professionals. Organizations no longer want to trust professionals who become “ethical hackers” by simply passing an online objective-based exam, as they seldom have the real-world perspective and confidence to execute the job once given. Professionals with incomplete knowledge are not only putting their organization at risk, but also their Nation, as they handle sensitive projects impacting the economy of the country.
The National Security Database is the only not-for-profit program, well recognized and respected by various Corporate and Government organizations for its stringent process and hands-on lab exams for assessing the credibility of a professional.
Instantly get pre-configured vulnerable systems in a network along with kali Linux in a private cloud for hands-on practical of topics.
The online videos for both Standard and Expert plan are self-paced while the live sessions are conducted every month or alternate months
Standard program is meant for beginners with a basic knowledge of Linux while Expert is for people with sound knowledge of Kali Linux tools and theory
Yes, we have EMI options available for both Standard and Expert program. For more details, please write to support@isacindia.org
Standard
12:00 to 02:30 PM
Standard
12:00 to 02:30 PM
To be announced
© 2021 All rights reserved | Support Phone: +91 8882-560-560 | support@isacindia.org
Made with ❤ in India