Have any questions? +91 9354357995 academy@kratikal.com

Training > Industrial Training (6-Months)

6Months Industrial Training in
Ethical Hacking & Penetration Testing
with live projects

  • B.Tech
  • B.E
  • B.Sc
  • BCA
  • MCA
  • M.Tech

5000+ Students Enrolled | 1650+ Ratings | English | Online/Offline

Lectures 81
Duration 6-Months
Skill Level Basic
Language English
This is a six months training course which gives detailed insight on Cyber Security. It is an instructor lead and modular designed training which provides both theoretical and experimental knowledge. The training covers advanced concepts of Hacking, Web Application Security, Mobile hacking, Pen Testing among other major modules. Towards the end of this training period you will be facilitated to do a real time project. The major takeaways of this course includes successfully building a career in Cyber Security.
Tools,OS,Frameworks We Use
  • What is Cyber Security
  • Statistics and Inferences
  • Need of Cyber Security
  • Common Terminologies
  • Career and Growth
  • Threats to the Cyber World
  • Hacking Phases
  • Skills of an Ethical hacker
  • Cyber Crimes
  • Statistics of Cyber Crime
  • Cyber Laws
  • Case Studies
  • Recent Cyber Crimes around the world
  • How to Report Cyber Crimes
  • Recent Initiatives in India
  • Security Compliances
  • Introduction
  • How computer Network Works
  • Networking Components
  • Subnetting
  • Networking Devices
  • Application Layer
  • Transport Layer
  • Internet Layer
  • Link Layer
  • Other Protocols
  • Introduction
  • Definition of terms
  • Objectives of Cryptography
  • Types of Attacks
  • Introduction to Cryptosystems
  • Encryption
  • Modern Ciphers
  • Cost Benefit Approach
  • Introduction to Symmetric key cryptography
  • Types of Symmetric Key Cryptography
  • Asymmetric Key Cryptography
  • Hashing
  • Cryptographic Protocols
  • Cryptographic Tools
  • Cryptographic Attacks
  • Introduction
  • Need of Footprinting
  • Targets of Footprinting IT
  • Footprinting Techniques
  • Conclusion
  • Introduction
  • Types of scanning
  • Objectives of scanning techniques
  • Port Scanning Techniques
  • Port scanner tools
  • Vulnerability Scanning
  • Determining Network Architecture
  • Conclusion
  • Introduction
  • Objectives of Spoofing
  • Types of Spoofing
  • Impact of spoofing
  • Legal issues
  • Counter Measures
  • Introduction to Operating System
  • Basic Function & Process
  • Windows
  • Linux
  • Mac Hacking
  • User Centered Attacks
  • Conclusion
  • Web Application Basics
  • Pasive Information Gathering
  • Active Information Gathering
  • Check authentication mechanism
  • Vulnerability in Authorization Mechanism
  • Injection Attacks
  • Web Application Vulnerabilities and its Defences
  • Web Application Security Scanner
  • SQL Injection
  • LDAP Injection
  • ORM Injection
  • XML Injection
  • SSI Injection
  • Injection Attacks
  • XPath Injection
  • IMAP/SMTP Injection
  • Code Injection
  • File inclusion vulnerabilities
  • Command Injection
  • How to prevent SQL Injection
  • Conclusion
  • Introduction
  • Interaction with an Android Device
  • Andriod Network Analysis
  • Android APK Reverse Engineering
  • Vulnerabilities in Android
  • Rooting Android Devices
  • Android Hacking tools
  • Android Security Tool DroidSheep
  • IOS Hacking Devices
  • Hacking Windows Phone OS
  • Introduction
  • What is WebServer and its architecture?
  • Type of WebServer/li>
  • Impact of WebServer Attacks
  • Compromised use details
  • Information Gathering for DNS related information
  • Tools used
  • Scanning
  • Nmap
  • Gaining Access
  • Attacks
  • SMTP Relay
  • Website Mirroring
  • Man-in-middle-attack
  • Http response splitting attack
  • Privilege Escalation
  • Metasploit
  • Countermeasure
  • Introduction
  • Types of firewall
  • Firewall implementation
  • Impact of WebServer Attacks
  • Unified threat management
  • Evading Firewalls
  • Firewall Identification
  • IP Address Spoofing
  • Source Routing
  • Tiny Fragments
  • Bypass Blocked Sites Using IP Address in Place of URL
  • Bypass Blocked Sites Using IP Address in Place of URL
  • Bypass a Firewall Using Proxy Server
  • Bypassing Firewall through ICMP Tunnelling Method
  • Bypassing Firewall through ACK Tunnelling Method
  • Bypassing Firewall through HTTP Tunnelling Method
  • Bypassing Firewall through SSH Tunnelling Method
  • Bypassing Firewall through External Systems
  • Bypassing Firewall through MITM Attack
  • Bypassing Firewall through Content
  • Intrusion Prevention System
  • Honeypots
  • Introduction
  • Statistics of Malware Infection
  • Type of malwares
  • Malware Economy
  • Impact of Malware Infections
  • Counter Measures
  • Conclusion
  • Introduction to DoS
  • DDoS attacks
  • Statistics related to DoS
  • Types of DDoS attacks
  • Sources & tools of DDoS
  • Detection of DoS Attacks
  • Mitigation Strategies
  • Unintentional DoS
  • Economics of DoS
  • Impact of DoS
  • Introduction to Wireless Networks
  • Introduction to 802.11WLAN Protocols
  • Basic concepts
  • Wireless attack scenarios
  • Bypassing WLAN Authentication
  • Cracking WEP Wi-Fi networks
  • Cracking WPA/WPA2 Wi-Fi networks
  • Client Side Wi-Fi Attacks
  • Man in the Middle Attack
  • Wireless Penetration testing
  • Conclusion
  • Factors that make companies
  • Warning signs of attack
  • Basic concepts
  • Phases in a social engineering attack
  • Common targets of social engineering
  • Human Based Social engineering
  • Computer based social engineering
  • Mobile based social engineering
  • Insider Attack
  • Preventing Insider threats
  • Masquerading on Social Networking
  • Identity Theft
  • Social engineering Countermeasures
  • How to detect phishing emails
  • Identity Theft Countermeasures
  • Introduction
  • Deployment model
  • Categories of Cloud Computing
  • Cloud Computing Benefits
  • Information Management and Data
  • Interoperability and Portability
  • Cloud Security Models
  • Cloud Security
  • Cloud Security Tools
  • Limitations of Cloud
  • Privacy and Security Concerns
  • Conclusion
  • Introduction to IoT
  • Technical Overview of IoT
  • Security of IoT Devices
  • Use of IoT
  • Conclusion
  • Introduction
  • Penetration testing
  • Vulnerability Assessment vs Penetration testing
  • Legal Authority
  • Importance of Penetration testing
  • Advantages of Pentesting
  • Method of pentesting
  • Penetration Testing Execution Standard
  • Reporting
Course Curriculum

Other Trainings

Summer Training

Lectures:30-32 | Duration:6-Weeks

Industrial Training

Lectures:30-32 | Duration: 6-Months

What You Will Get ?

Industry recognized certification

Study Materials, Resources and Books

Software Tool kits

Video Lectures

Lifetime access to
e-learning portal

Live testing projects

Supported and Reviewed By
Accredited and Reviewed By

Alumni Of Kratikal Working At

Still have doubts? Talk to our counsellor