Certified Information Security  Professional 

Who should attend?

This course is  specially designed for Security Enthusiasts, IT professionals, and Professional Pentesters  to understand VAPT in detail  to achieve their goals.

Offensive CTF
  • Customize Kali Linux environment
  • Linux Advanced Commands & Usages
  • Types of shells
  • Sniffing networks
  • Intelligent Gathering Concepts & techniques
  • File transfer Techniques over various methods
  • Shell scripting basics
  • Banner grabbing concepts
  • Network Scanning & Scripting engine
  • Enumeration of various services
  • Web Application Attacks
    1. SQL Injection
    2. Local file inclusion
    3. Other Attacks
  • Metasploit exploitation techniques
  • Password cracking & brute force techniques
  • Customization of exploits & development
  • Privilege Escalation Techniques
    1. Linux post exploitation & privilege escalation
    2. Windows post exploitation & privilege escalation
  • Port forwarding methods & tunnelling concepts
  • Buffer overflow concepts & Exploitation
  • Various lab exercises, CTFs, HTB exercises
  • Report Writing Concepts