6 Months Ethical Hacking, Penetration Testing Course

Truephers Certified Penetration Tester

[Complete 120 hours Course]

This course is a complete version of our two other Ethical Hacking and Cyber Security courses (Truepher Certified Cyber Security Professional and Truephers Certified Penetration Tester). The 6 months course in Ethical Hacking and Cyber Security at Chandigarh, Mohali, Panchkula includes syllabus and certifications covered in both courses with some advanced topics are included in it. The main agenda of this training program is to make prepare a student who owns no or some basics knowledge, a Cyber Security Professional and to make him/her ready to enter into the professional world of Cyber Security. We at Truephers chandigarh, focuses more on practicals, because this field demands more practical knowledge instead of just having a theoretical knowledge. At our labs, students will not only learn theoretical knowledge but will also do practicals on the dedicated virtual labs containing hacking machines, Linux, Windows servers and client machines. With all these students will get a real-world like learning environment through which he/she can learn and expand his/her ideas. Truephers provide full working day lab access to the dedicated and desired students. Truephers provides hands-on practice with dummy websites and virtual machines at industry standards. 

Call for DEMO class booking at 73994 99473

Course Content​

Each module contains subtopics in it, expand to see. The Time duration for this course is 6 months.

  • Introduction to Internet Protocol
  • IP Addresses
  • IP Address Spoofing (Changing IP Address)
  • Proxies
  • Tor Browser, Web proxies, Manual proxies, VPN
  • Ports (Logical ports)
  • TCP/UDP 
  • 3-way TCP handshake
  • DNS
  • DHCP
  • SMTP, POP3, IMPS
  • HTTP, HTTPS, SSL, TLS
  • MAC Address (Hardware Address)
  • MAC Address Spoofing
  • Hubs and Switches
  • Introduction to Data Forensics
  • Data recovering
  • Permanent Data deletion
  • Windows Forensics
  • Events and Logs views
  • USB and Browser Forensics
  • Disk Encryption
  • Image Steganography
  • Audio/ Video Steganography
  • Introduction to Virtual Machines.
  • Installation of Virtual Box, VMWare, KVM’s
  • Configuration of Virtual Machines in details
  • Networking in Virtual Machines
  • Importing/ Exporting Virtual Machines
  • Cloning Virtual Machines
  • Introduction to UNIX/ LINUX
  • Downloading and Installing Linux
  • File Structure
  • Basics Commands
  • Introduction to Kali Linux
  • Installing Kali Linux
  • File Structure
  • Installing and Configuring SSH, FTP, TFTP, Apache, Tomcat, Postgresql, Python, and other important services and daemons in Kali Linux
  • Installing and Configuring Kali Pen testing Tools
  • Bash Scripting
  • Essential Tools – Netcat, Ncat, SOCAT, Wireshark, tcpdump
  • Virus creation
  • Trojan creation
  • NetBus
  • Poison ivy, Cybergate RAT
  • Binder’s
  • Crypter’s
  • SMURF DOS
  • Ping of Death DOS
  • ICMP Flood
  • SYN Flood
  • Slow Loris
  • DDOS
  • Case Scenarios
  • Using Google Dorks
  • Finding files, pages for particular Website
  • Finding Open Cameras
  • Finding Routers
  • Exploit-db GHDB
  • SHODAN (Search Engine for IOT)
  • Windows/ Linux password hashing
  • Windows SAM Database
  • Linux passwd/ shadow files
  • Windows Password Cracking
  • Linux Password Cracking
  • Brute-forcing
  • Rainbow tables
  • Ophcrack
  • Cain and Able
  • bkhive, samdump2
  • Password Hashing and Encryption
  • Password profiling with cupp
  • Password generator tools
  • Hydra
  • Hashcat
  • John The Ripper
  • HTTP – FTP – Telnet – RDP – RAR – ZIP – MD5 – SHA – LM/ NTLM password hashes and cracking with different tools and techniques
  • Active Information Gathering
  • OS Fingerprinting
  • Port Scanning
  • Banner Grabbing.
  • Different Port Scanning tools and types.
  • Port Scanning with Nmap
  • Nmap Scripting Engine
  • Netcat/ Zenmap
  • Domain Name WHOIS lookup
  • Reverse hostname lookup
  • SMB Enumeration
  • SMTP Enumeration
  • SNMP Enumeration
  • Passive Information Gathering
  • Google Hacking Database
  • Google Dorks
  • Online Email Finder
  • Online Active ports scanners 
  • Reverse hostname lookup
  • Netcraft
  • DNS Zones
  • Zone transfer
  • Wayback Machine
  • Uptime Monitoring
  • Online Domain tools
  • Wired Sniffing and Wireless Sniffing
  • ARP Poisoning
  • Wireshark
  • Cain and Able
  • SSL-strip
  • Wireless USB adapters
  • Monitor mode and Promiscuous mode
  • WEP Encryption
  • WEP Password Cracking
  • WPA/ WPA2 Password Cracking
  • WPS Cracking
  • Configuring and Finding Hidden SSID’s 
  • Beating Black-list/ White-list MAC filtering
  • Using other tools
  • Vulnerability Scanners
  • Configuring and Installing Vulnerability Scanners
  • Nessus
  • Nexpose
  • OpenVAS
  • Web Vulnerability Scanners
  • Acunetix Vulnerability Scanner
  • Nikto
  • Dirbuster
  • Configuring Vulnerable Web Application for Learning and Testing
  • Burp-Suite
  • OWASP ZAP
  • Nikto
  • Dirbuster Dirb
  • SQLmap
  • Cross Site Scripting XSS 
  • SQL Injection
  • RFI/ LFI
  • Insecure Sensitive files (password, backup files)
  • OS Command Injections
  • Insecure File Uploads
  • And their Mitigations
  • Browser based client side attacks
  • Java signed applet attacks
  • SMB based client side
  • PDF, Excels, Word documents based client side attacks
  • Responder
  • Fuzzing
  • Debugger
  • DEP ASLR
  • Crashing
  • Registers
  • Controlling EIP
  • Bad Characters
  • Space for Shellcodes
  • Finding Return address
  • Generating a shell code with msfvenom
  • Getting Shell on the box
  • Installing or updating
  • User Interfaces
  • Exploring Auxiliary module
  • Exploring Exploit module
  • Metasploit Payload module
  • Searchsploit Exploit-db
  • Staged vs. Non-staged payloads
  • Meterpreter 
  • Web Shells
  • Uploading and Executing different types of webshells
  • ASP, PHP, Java, Cold-fusion, Perl Web Shells
  • Payload Generators
  • MSFVenom
  • Port forwarding and redirections
  • SSH tunneling
  • Local port, Remote Port and Dynamic port forwarding
  • HTTP Tunneling benefits
  • Proxychains
  • Metasploit port forwarding
  • Plink
  • Other proxy tools
  • Linux and Windows Privilege Escalation
  • Vertical Privilege Escalation
  • Horizontal Privilege Escalation
  • Misconfigured File permissions
  • Kernel Exploits
  • Automated scripts to privilege escalation
  • Securing Windows 
  • Windows Password profiling
  • Updating and Patching Windows
  • Files Permissions
  • User Access Control
  • Linux Server Hardening
  • Securing sensitive and configuration files
  • Updating and Patching system and services
  • Configuring Secure CMS
  • Intrusion Detection Systems
  • Firewalls
  • Intrusion Prevention System
  • WIPS, WIDS
  • Snort
  • Understanding Android OS
  • Rooting Android
  • Installing Xposed Framework
  • Installing Hacking tools
  • Creating malicious apk with msfvenom
  • APK binding and signing.
  • Hacking Android with Metasploit
  • Hacking Android with other tools
  • Sample Reports
  • Report generation tools
  • Maintaining Important links and texts in report generation
  • Making Bootable Pen-drive
  • GNS3
  • USB Password Snifing

Regular Classes

  • Course duration is 120 hours
  • No time limitation for practice
  • 2 hours a day, 5 days a week for classes
  • Doubt clearance sessions
  • Fully equipped practice machines.
  • 70% practicals
  • Internet access
  • Weekly tests and Quizzes
  • Online fee payment available
  • Max 1:14 Teacher Students ratio
  •  Includes Offline/Online Training + Exam + Certification + Job assistance
  • We provide assistance for international certifications as well.

Weekends Classes

  • Course duration is 120 hours
  • No time limitation for practice
  • 5 hours each on Saturday Sunday
  • Doubt clearance sessions
  • Fully equipped practice machines.
  • 70% practicals
  • Internet access
  • Weekly tests and Quizzes
  • Online fee payment available
  • Max 1:10 Teacher Students ratio
  •  Includes Offline/Online Training + Exam + Certification + Job assistance
  • We provide assistance for international certifications as well.

Why TRUEPHERS'​ Training ?

  • Government registered organization
  • Offensive Security certified trainers
  • Core Ethical Hacking | Nothing else
  • Best Ethical Hacking institute in Chandigarh, Mohali
  • Lowest fees but unlimited learning
  • No extra fee for exam and certification
  • 100% Job assistance and interview scheduling
  • Guaranteed lowest fees than others
  • Tailored made training courses available
  • Free personality development training session
  • ISO certified training center
  • No time limit for practice | Full day lab access
  • Full satisfaction of students guaranteed
  • Group discounts | Learn with your friends and colleagues

What requires to be an Ethical Hacker

  • Should know how to operate a computer (Graduation is a plus).
  • Self learner
  • Lots of reading for advancing and learning.
  • Hacker minded
  • But Ethical too
  • Understanding of english language is a plus
  • Crave to learn more always
  • Patience

What you will get in this course

  • Free study material (Ebooks+Tools+Videos tutorials)
  • Truephers Certified Penetration Testing Certification
  • Ethical Hacking 6 months work experience certificate
  • Job Interview preparation
  • Projector led Training (Hindi + English)
  • Full job assistance + Life time job feeds
  • Job opportunity to deserving students at Truephers
  • Hands-on practical training with fully equiped Virtual labs.
  • Weekly quizes and test for certificate preparations
  • Nearby affordable PG available

Learn from Experts

Our Trainers are Offensive Security Certified Professionals. Having a vast experience in Penetration Testing and Teaching as well. 

Be A Truephers Certified

Learn from Industry Leader and get Certified with Truephers. 

Goodies takeaway

Certificate

Students who clear the Exam with atleast 70% marks gets the certification + Goodies. If fails, he can retake Examination at a nominal fee of Rs 300.

Toolkit

Students who enroll for this course gets the latest version of free, trial and community editions of tools, used during the training.

E-Book's

Students who enroll for this course gets the latest version of free and community editions of ebooks used during the training.

Full Job Assistance

Every Student who cleares the Exam gets full job assistance till she gets her first job.

Meet Our Training Lead

Harjeet Singh Baidwan

Training head & CEO

Harjeet Singh Baidwan is a name among top Cyber Security enthuasists.

Meet us at:

F-28, Top Floor, Phase 8, Industrial Area, S.A.S Nagar, Mohali, Punjab 160071

Call us

+91 73 994 994 73

E Mail us

info@truephers.com

Make us Call You

WHATSAPP US FB Messenger +917399499473