site-logo
bg

PENETRATION TESTING NERD (C-PTN)

RS. 52,000 + GST

Penetration Testing Nerd training is meticulously crafted to equip participants with the foundational skills and knowledge needed to kickstart a successful career in cybersecurity. This module is designed for individuals with a passion for cybersecurity and a goal to secure an entry-level position in this dynamic and ever-evolving field.

element

"Explore cybersecurity's frontline with our beginner's penetration testing course—uncover vulnerabilities, fortify defenses, and defend digital assets."

Training Features

icon

120+ Hrs of Live Training

icon

Practical Hands-on

icon

Real-time Projects

icon

Placement assistance

icon

Career Guidance

icon

Job Oriented Training

WHAT YOU Learn from this TRAINING

Introduction to Cyber Security
  • Introduction
  • The Five Phases of Ethical Hacking
  • CIA Triad
  • Cryptography
  • Types of Cyber Threats
Network basics
  • Introduction
  • Network Models and Protocols
  • Networking Devices and Technologies
  • IP Addressing and Subnetting
  • Routing and Switching
  • Network Security
Linux basics
  • Introduction to Linux
  • Linux File System
  • Linux Command Line Interface (CLI)
  • User and Group Management
  • Process Management
  • Linux Servers and Services
Python Basics
  • Introduction to Python, IDE, Common Syntax and variables
  • : Control Structures, Loop and Functions
  • List, Tuple, Sets and Dictionaries
  • Error Handling and File Handling
  • Module Handling and Framework Basic
Web app penetration testing
  • Introduction to Web Application Security
  • Web Technologies and Protocols
  • Web App Architecture and Components
  • OWASP Top 10
  • Web Application Reconnaissance and Footprinting
  • Web Application Scanning and Vulnerability Assessment
  • Manual Testing Techniques
  • Exploitation and Post-Exploitation
  • Web Application Firewall (WAF) Bypass Techniques
  • Portswigger labs
  • DVWA deployment and pentesting
  • Reporting and Remediation
Network penetration testing
  • Networking Basics Review
  • Information Gathering and Reconnaissance Hacking
  • Vulnerability Scanning and Assessment
  • Exploitation Techniques
  • Post-Exploitation and Pivoting
  • Firewall and IDS/IPS Evasion Techniques
  • Wireless Network Penetration Testing
Mobile Penetration testing
  • Introduction to Mobile App Security
  • Mobile App Platforms and Architecture
  • Mobile App Reconnaissance and Information Gathering
  • Static and Dynamic Analysis of Mobile Apps
Infosec structure and function

Request a FREE demo