Cyber Security Academy

Certified Penetration Testing Expert - CPTE

About the Programme

Develop Your Knowledge Base by Getting the Right Training With Respect To Security Fundamentals.

Course Content

  • Difference & Approach between
  • VA and PT
  • Domains of VAPT
  • Types of VAPT
  • Red Team and Blue Team
  • History of Linux
  • Lab Setup
  • Linux Architecture
  • Basic Commands of Linux
  • Linux Auditing
  • Acunetix
  • Vega
  • ZAP
  • Nikto
  • Sparta
  • Proxy
  • Spider
  • Scanner
  • Intruder
  • Repeater
  • Sequencer
  • Decoder
  • Comparer
  • Extender
  • Alerts
  • Whois lookup
  • Reverse lookup
  • IP history
  • Detecting Backend Technology
  • Directory Fuzzing
  • Subdomain Enumeration
  • Eyewitness
  • Google Dorking
  • Shodan
  • CMS
  • WPScan
  • JoomScan
  • DPScan
  • Injection
  • Broken Authentication and Session
  • Management
  • Cross-site scripting
  • IDOR
  • Security Misconfiguration
  • Sensitive Data Exposure
  • Missing Function level Access
  • Control
  • CSRF
  • Using Components with known vulnerabilities
  • Un-validated redirects and forwards
  • S3 Bucket
  • HTTP Parameter Pollution
  • Bypassing 2FA
  • SSRF
  • LFI
  • RFI
  • RCE
  • Clickjacking
  • Ways to report
  • Formatting & Guidelines of report
  • Case Study
  • Bug hunting
  • Finding Bugs
  • Common vulnerabilities neglected by Testers
  • Making valid POC
  • Introduction
  • Understanding of APK
  • DEX to Jar
  • Drozer
  • OWASP Mobile Top 10
  • Introduction
  • Debugging Tool
  • Understanding of Assembly
  • Network Infrastructure
  • Information Gathering
  • Nmap Scanning
  • Nessus
  • Backdoors
  • Compromising Dcs
  • Pass the Hash
  • Role of AD
  • Post Exploitation
  • AV Evasion
  • Bypassing Firewalls
  • Empire
  • Mimikatz
  • Powershell
  • Introduction
  • Information Gathering
  • Payloads
  • Auxiliary
  • Meterpeter
  • Armitage
  • Types of Firewall
  • Implementation
  • Inbound Outbound Rules
  • IDS & IPS
  • Auditing
  • Introduction
  • Understanding of WEP, WPA, WPA2
  • WEP, WPA Cracking
  • Fluxion
  • Ways to report
  • Formatting & Guidelines of report
  • Case Study
  • Introduction
  • Benefits & Applications of IoT
  • Issues with IoT
  • IoT Attack Surface
  • OWASP Top 10

Register Now

To register for the course, please fill in the details below and a BIBF representative will attend to you within the next 24 hours.


    Organization SponsoredSelf Sponsored

    TOP

    BIBF Digital Transformation Academy