Learn everything to get started in cybersecurity as a Pentester, Empanelled Under FutureSkills Prime. Unlock Lifetime Access to Certifications with Complimentary Training and Free of Cost Online Internship: pay only for certification and lab costs.
Course Content
The program is a foundation for many other job roles including SOC, Threat Management, Computer Forensics, Web Application Security, ISO 27001 Compliance, PCI-DSS, Internal IT Security Audit etc. The course includes:
Introduction
- Introduction to Ethical Hacking
- Types of Hackers and their motives
- Some Basic Terminologies
- CIA Triad
Networking Basics
- OSI Model
- TCP/IP Protocol Stack
- Protocol and their related Services
- IP Address, MAC Address, Port Address
- Subnetting and Routing
- Wireshark – Packet Sniffing and Analysis
Software Installation and Experimental Setup
- About Linux/Unix Operating System
- Setting-up your Hacking environment
- Honeypots
Linux Basics
- Linux File Structure
- Basic Linux Commands
- TCPDump, Tshark, Netcat etc. (Network Analysis)
- Basics of Vulnerability Scanning using Nmap & related Scripts
- MAC Changer
Linux Booting Process
- Linux Run Levels
- Linux Permissions
- Basics of Bash Scripting
Cryptography and Steganography
- Symmetric Encryption / Private Key Cryptography
- Asymmetric Encryption / Public Key Cryptography
- Cryptographic Hash Functions and Values
- Encoding Decoding
- Steganography and different types
- Steghide, stegseek etc.
Passive Reconnaissance
- Netcraft
- nslookup
- Google Dorking
- Shodan
- Censys
- The Harvester
- Whois Enumeration and Reverse Whois
- DNS Enumeration
Active Reconnaissance and Connection Establishment
- Traceroute
- Netcat
- Nmap
- Metasploit (overview)
- FTP Connection and Remote File Uploading/download
- SSH Connection
- Telnet Connection
Vulnerability Scanning
Advanced Vulnerability Scanning using NMAP
OpenVAS/Nessus
Password Cracking
- Wordlists
- Creating Custom Wordlists using Crunch
- Hydra for Password Cracking
- John the Ripper
- Metasploit for SSH password cracking
- Cyber Chef
- Rainbow Tables
- Basic Authentication Attacks
Malwares, Trojans, Virus and Worm
- Different Types of Malwares and Viruses
- Different Types of Bombs
- Dos and DDoS Attacks
Darkweb
- TOR
- Onion Websites
Metasploit
- Introduction to Metasploit
- Creating payloads using Metasploit
- Reverse Listeners
- Exploiting Windows System
- Working with Burp Suite
- HTTP Request and Methods
- Status Codes
- CVSS
Introduction to Web Pentesting
- Reflected XSS
- Stored XSS
- DOM XSS
- Javascript Validation
- SQL Injection
- Command Injection
- OWASP Top 10
- 2013 v/s 2017 v/s 2021
- Bruteforcing
- Content Security Policy
- Security Headers
Subdomain Enumeration
- Waybackurls
- Tips & Tricks
- CTF Solving Approach
- Pentest Reports
Recognized by NEAT 2.0, Ministry of Education
With over 20,00,000 jobs available in India alone, it is increasingly becoming difficult for companies to find good cybersecurity professionals. Organizations no longer want to trust professionals who become “ethical hackers” by simply passing an online objective-based exam, as they seldom have the real-world perspective and confidence to execute the job once given. Professionals with incomplete knowledge are not only putting their organization at risk, but also their Nation, as they handle sensitive projects impacting the economy of the country.
The National Security Database is the only not-for-profit program, well recognized and respected by various Corporate and Government organizations for its stringent process and hands-on lab exams for assessing the credibility of a professional.
What is Futureskills Prime ?
A skilling ecosystem focused on emerging technologies, powered by a partnership between the Ministry of Electronics and Information Technology, the Government of India, NASSCOM, and the IT industry. It seeks to propel India to become a global hub of talent in emerging technologies.
Benefits of FutureSkills Prime:
- Participation and Course Completion Certificate
- Incentives from the Government of India. Get part fee refund.
- Access to Career Fairs, Hackathons, Internships, Skill Challenges, etc
- Flexibility to pick from the variance of courses aligned to NSQF (National Skills Qualifications Framework)
- Opportunities to apply for roles like security analyst, cloud architect, and IoT network specialist.
Batches
The sessions will be scheduled on the following dates between 4:00 PM – 7:00 PM
- 6th April 2024
- 7th April 2024
- 13th April 2024
- 14th April 2024
- 20th April 2024
- 21st April 2024
- 27th April 2024
The schedules are subject to change and will be intimated in advance
The sessions will be scheduled on the following date:
7:30 PM – 9:30 PM
4th May 2024
The schedules are subject to change and will be intimated in advance.
The sessions will be scheduled on the following date:
4th May 10PM to 5th May 10PM
The schedules are subject to change and will be intimated in advance.
Who Should Attend
- Network Admins
- Students and Professionals keen to get started in Cybersecurity
- Programmers keen to learn secure coding
- Law Enforcement Agencies
- Armed Forces Personnel
What you Get
Get 60 days of access to Cyber Range Virtual Labs – Practice with predefined vulnerable Applications and Kali OS Distribution in the cloud, in an exclusive private network only for you.
Cyberange Virtual Labs comprises:
- Exclusive labs
- Real-world scenarios for practice
- Cloud-based labs with new challenges added every month
Get access to course video on the e-learning portal, Updated regularly.
The program includes Clean Exit Professional Ethics Certification that is mandatory for empanelment in the National Security Database.
Get listed in the National Security Database program at the Falcon level by completing the program.
Examination
- 3 Hour MCQ
- 24 Hours Lab Exam
- 26 hours of Lab Test
Delivery Format
72 hours (8 Live sessions) Instructor-led program.g
Weekly assignments and research.
The course is of Seven days.
How do I Access The Programme
- Buy the course online
- Save your payment transaction receipt for any future reference
- Our team will share the credentials to enable you access your course online within 2 business days of payment transfer and completion of the verification process.
Bulk Orders
Incase you are looking for bulk user licenses, or a combination of multiple courses reach out to us with your detailed requirements.
Reviews
There are no reviews yet.