Have any questions? +91 7388939769 ankit@kratikal.com

6Months Industrial Training in
Ethical Hacking & Penetration Testing
with live projects

  • B.Tech
  • B.E
  • B.Sc
  • BCA
  • MCA
  • M.Tech
In this 6 Months training, you will be able to know more about cyber security as here you will get the advanced concepts of hacking, cyber security, and security assessment in a simple and logical manner. It will boost your career in the cyber world and you may get jobs in various MNC's or can start your own business. Here you also going to do hands-on practice over real-time projects.

Live Projects

Vulnerability Analysis using GHDB

VA for Network and Port Scanning

Intercept request & responses to all the communications

VA of the Hacking Points (Vulnerabilities)

Implement Cross Site Scripting(XSS)

SQLmap for SQL injection.

Takeaways for the students

Industry recognized certification.
Training under Kratikal Certified Instructor.
Live security testing (VA)
projects under Kratikal.
Course Material, Video, Lectures
and DVD toolkit.
Regular assessments and
skill checks.
Lifetime access to job portal.
  • What is Cyber Security
  • Statistics and Inferences
  • Need of Cyber Security
  • Common Terminologies
  • Career and Growth
  • Threats to the Cyber World
  • Hacking Phases
  • Skills of an Ethical hacker
  • Introduction
  • Targets and techniques
  • Live projects
  • Introduction
  • Types of scanning
  • Objectives of scanning techniques
  • Port Scanning Techniques
  • Port scanner tools
  • Vulnerability Scanning
  • Determining Network Architecture,Conclusion
  • Basics of Web Application
  • Passive Information Gathering
  • Active Information Gathering
  • Check Authentication Mechanism
  • Vulnerabilities in Authorization Mechanism
  • Injection Attacks
  • Web Application Vulnerabilities and its Defenses
  • Web Application Security Scanner
  • SQL Injection
  • Code Injection
  • File Inclusion Vulnerability
  • Command Injection
  • How to prevent SQL Injection
  • Facebook Hacking (Phishing)
  • Email Hacking (Gmail, Yahoo mail)
  • Fake SMS
  • Fake Calls
  • Insider Threats
  • Identity Thefts
  • Counter measures
  • Penetration testing
  • Vulnerability Assessment vs Penetration testing
  • Importance of Penetration testing
  • Methods of Pentesting
  • Penetration Testing Execution Standard
  • Stages of Pentesting
  • Reporting
Still have doubts? Talk to our counsellor
Contact Us
Lecture 30-32
Duration 6-Months
Skill Level Basic
Language English
Accredited By

Alumnus of Kratikal working at