Cyber Security Training in India | Cyber Security Training in pune |

4Weeks Industrial Training in
Ethical Hacking & Penetration Testing
with live projects

  • B.Tech
  • B.E
  • B.Sc
  • BCA
  • MCA
  • M.Tech
Kratikal Academy is providing the great opportunity for students who have a keen interest in cybersecurity. Nowadays, everyone is dependent on Internet-based tools and services and as we keep confidential data here, so there is the huge need for cybersecurity experts. In this training, you will get a full practical guide on how web applications are hacked, data breaches takes places and how to prevent them. Also include some all common attacks SQL Injection, Cross Site Scripting, CSRF, Phising etc.

Live Projects

Vulnerability Analysis using GHDB

VA for Network and Port Scanning

Intercept request & responses to all the communications

VA of the Hacking Points (Vulnerabilities)

Implement Cross Site Scripting(XSS)

SQLmap for SQL injection.

Takeaways for the students

Industry recognized certification.
Training under Kratikal Certified Instructor.
Live security testing (VA)
projects under Kratikal.
Course Material, Video, Lectures
and DVD toolkit.
Regular assessments and
skill checks.
Lifetime access to job portal.
  • What is Cyber Security
  • Statistics and Inferences
  • Need of Cyber Security
  • Common Terminologies
  • Career and Growth
  • Threats to the Cyber World
  • Hacking Phases
  • Skills of an Ethical hacker
  • Introduction
  • Targets and techniques
  • Live projects
  • Introduction
  • Types of scanning
  • Objectives of scanning techniques
  • Port Scanning Techniques
  • Port scanner tools
  • Vulnerability Scanning
  • Determining Network Architecture,Conclusion
  • Basics of Web Application
  • Passive Information Gathering
  • Active Information Gathering
  • Check Authentication Mechanism
  • Vulnerabilities in Authorization Mechanism
  • Injection Attacks
  • Web Application Vulnerabilities and its Defenses
  • Web Application Security Scanner
  • SQL Injection
  • Code Injection
  • File Inclusion Vulnerability
  • Command Injection
  • How to prevent SQL Injection
  • Facebook Hacking (Phishing)
  • Email Hacking (Gmail, Yahoo mail)
  • Fake SMS
  • Fake Calls
  • Insider Threats
  • Identity Thefts
  • Counter measures
Still have doubts? Talk to our counsellor
Contact Us
Lecture 30
Duration 4-weeks
Skill Level Basic
Language English
Accredited By

Alumnus of Kratikal working at