Web Pentest Basic Training

This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine.

Modules to be covered:
  • Chapter 1: Introduction
  • Chapter 2: Course Preparation: Lab Setup
  • Chapter 3: Useful Information Before We Start
  • Chapter 4: Footprint and Reconaissance
  • Chapter 5: File Upload Vulnerability
  • Chapter 6: Code Execution Vulnerabilities
  • Chapter 7: Local File Inclusion Vulnerabilities
  • Chapter 8: Remote File Inclusion Vulnerabilities
  • Chapter 9: Introduction to SQL Injection
  • Chapter 10: SQLi on HTTP Post Requests
  • Chapter 11: SQLi on HTTPS Get Requests
  • Chapter 12: Advanced SQLi
  • Chapter 13: Cross Site Scripting (XSS)
  • Chapter 14: BeEF Framework
  • Chapter 15: Cross Site Request Forgery (CSRF)
  • Chapter 16: Password Attacks
  • Chapter 17: Advanced Web Hacking and Automation
  • Chapter 18: Conclusion
Who should attend?

Course is designed to address the needs of:

  • Anyone with Computer engineering background or pursuing BCA/MCA.
  • Ethical Hacking Students.
  • Security Analysts.
  • Law Enforcement Personnels.
  • IT Personnels working in Android Development domain.
  • IT Personnels working in IT-Security domain.

Recommendation:

Course is suitable for those who are looking to get a foothold in information security and join field of Android Application Penetration Testing as a profession or aim to explore new career opportunities. It is the most intensive course offered by Cyberops training which will provide a unique perspective into the intricate world of information and Cyber security. Thus the Course it highly recommended to:

  • Professionals who are looking for prospective career opportunities in cyber security field.
  • This course is most recommended for Security Enthusiasts, IT professionals, and Mobile
  • Application Developers seeking to understand typical mobile application security issues in detail.
Pre-Requisite:
  • Basic knowledge of programming fundamentals.
  • Basic knowledge of programming languages such as Java.
  • Basic security concepts such as : cryptography, reverse engineering, SQL injections and web tools such as Wireshark and OWASP ZAP (or Burp).
Course Package includes:

Once you understand how websites work, we will start talking about how can we exploit these components and this method of communication to carry out a number of powerful attacks. This course will take you from a beginner to a more advanced level — by the time you finish, you will be able to launch attacks and test the security of websites and web applications exactly the same way that black hat hackers would do, not only that but you’ll be able to fix these vulnerabilities and secure websites from them. All the attacks explained in this course are launched against real devices in my lab.

At the end of the course you will be able to:

Techniques and methods how to penetrate Android Mobile Applications, how to begin with android app penetration testing, network monitoring on devices, hack vulnerable applications that has been created by our trainers in order to help you practice all the hands-on exercises and finally some automated tools to complete the task. The course contains more than 14 challenges where we will teach you how to crack it.

Discover all the android application security models which play an important role in the design and evaluation of high assurance security systems. It mainly focuses on Virtualization, APK File Structure, networking emulator, ARM packages in emulator, Android Application Development Basics, Privilege Management & Escalation, Analyzing,Root Access in Android.

Certification:

The entire program covers basic outline of cyber security as well as methods and techniques of how attacks are performed and possible outcomes of attacks along with the detection and prevention methods for the same.

Thus the practical exam after the course is entitled for certification aiming at how participants use skills, expertise and knowledge gained throughout course to detect possible attacks and methods to penetrate, hence to be specialized for the modules covered candidates are required to clear the set performance criteria for certification.

Requirements:

We use Simulation test method to provide real time challenge which will help participants to use skills , expertise and knowledge acquired during the entire course.
Passing Criteria: 70% and above

Excellence Award

Participant with highest score in batch will be awarded with Cyberops award of performance Excellency – CAPE Medal and certification of Merit.

Terms & Conditions:

No. of attempts :One
Verification method for certification: The certificate will incorporate a unique ID for every participant and the same can be used for verification from Our Website.

Duration of test: 5 hrs

Get In Touch With Us

Success/Error Message Goes Here

Contact Us

26/A, Electronics City Phase 1, Electronic City, Bengaluru, Karnataka 560100

connect@octasecurity.com

TOP