Six Weeks Ethical Hacking Training Course Chandigarh

Truephers Certified Penetration Tester 2.0

Students who want to enroll for TCPT must have basic knowledge equivalent to TCSP 1.0 course. Truephers offers 60 hours of comprehensive advanced-level Ethical Hacking, Penetration Testing Industrial training course at Chandigarh, Mohali. Truephers focuses more on practical than theoretical.TCPT 2.0 course is for those who thrive to learn and want to drive their career in CyberSecurity. There is no age limitation for the student who can join this course. You can be a teen, a school going or a college pursuing student, an employee in a public or a private sector, a technology lover or an enthusiast, who wants to be Cybersecurity and Penetration Testing Professional. We at Truephers impart, learning with the latest tools and most of the time is given to the practicals. In TCPT 2.0, we teach students the advanced concepts of Penetration Testing. The student will learn how to do real-world Penetration Testing. This course requires a high level of self-study and self-research.

Course Content​ TCPT 2.0

Each module contains subtopics in it, expand to see. The course duration is 60 hours.

  • Introduction to Kali Linux
  • Installing Kali Linux
  • File Structure
  • Installing and Configuring SSH, FTP, TFTP, Apache, Tomcat, Postgresql, Python, and other important services and daemons in Kali Linux
  • Installing and Configuring Kali Pen testing Tools
  • Bash Scripting
  • Essential Tools – Netcat, Ncat, SOCAT, Wireshark, tcpdump
  • Active Information Gathering
  • OS Fingerprinting
  • Port Scanning
  • Banner Grabbing.
  • Different Port Scanning tools and types.
  • Port Scanning with Nmap
  • Nmap Scripting Engine
  • Netcat/ Zenmap
  • Domain Name WHOIS lookup
  • Reverse hostname lookup
  • SMB Enumeration
  • SMTP Enumeration
  • SNMP Enumeration
  • Passive Information Gathering
  • Google Hacking Database
  • Google Dorks
  • Online Email Finder
  • Online Active ports scanners 
  • Reverse hostname lookup
  • Netcraft
  • DNS Zones
  • Zone transfer
  • Wayback Machine
  • Uptime Monitoring
  • Online Domain tools
  • Windows/ Linux password hashing
  • Windows SAM Database
  • Linux passwd/ shadow files
  • Windows Password Cracking
  • Linux Password Cracking
  • Brute-forcing
  • Rainbow tables
  • Ophcrack
  • Cain and Able
  • bkhive, samdump2
  • Password Hashing and Encryption
  • Password profiling with cupp
  • Password generator tools
  • Hydra
  • Hashcat
  • John The Ripper
  • HTTP – FTP – Telnet – RDP – RAR – ZIP – MD5 – SHA – LM/ NTLM password hashes and cracking with different tools and techniques
  • Vulnerability Scanners
  • Configuring and Installing Vulnerability Scanners
  • Nessus
  • Nexpose
  • OpenVAS
  • Web Vulnerability Scanners
  • Acunetix Vulnerability Scanner
  • Nikto
  • Dirbuster
  • Configuring Vulnerable Web Application for Learning and Testing
  • Burp-Suite
  • OWASP ZAP
  • Nikto
  • Dirbuster Dirb
  • SQLmap
  • SQL Injection
  • RFI/ LFI
  • Insecure Sensitive files (password, backup files)
  • OS Command Injections
  • Insecure File Uploads
  • And their Mitigations
  • Browser based client side attacks
  • Java signed applet attacks
  • SMB based client side
  • PDF, Excels, Word documents based client side attacks
  • Responder
  • Fuzzing
  • Debugger
  • DEP ASLR
  • Crashing
  • Registers
  • Controlling EIP
  • Bad Characters
  • Space for Shellcodes
  • Finding Return address
  • Generating a shell code with msfvenom
  • Getting Shell on the box
  • Installing or updating
  • User Interfaces
  • Exploring Auxiliary module
  • Exploring Exploit module
  • Metasploit Payload module
  • Searchsploit Exploit-db
  • Staged vs. Non-staged payloads
  • Meterpreter 
  • Web Shells
  • Uploading and Executing different types of webshells
  • ASP, PHP, Java, Cold-fusion, Perl Web Shells
  • Payload Generators
  • MSFVenom
  • Port forwarding and redirections
  • SSH tunneling
  • Local port, Remote Port and Dynamic port forwarding
  • HTTP Tunneling benefits
  • Proxychains
  • Metasploit port forwarding
  • Plink
  • Other proxy tools
  • Linux and Windows Privilege Escalation
  • Vertical Privilege Escalation
  • Horizontal Privilege Escalation
  • Misconfigured File permissions
  • Kernel Exploits
  • Automated scripts to privilege escalation
  • Securing Windows 
  • Windows Password profiling
  • Updating and Patching Windows
  • Files Permissions
  • User Access Control
  • Linux Server Hardening
  • Securing sensitive and configuration files
  • Updating and Patching system and services
  • Configuring Secure CMS
  •  
  • Sample Reports
  • Report generation tools
  • Maintaining Important links and texts in report generation

Regular Classes

  • Course duration is 60 hours
  • No time limitation for practice
  • 2 hours a day, 5 days a week for classes
  • Doubt clearance sessions
  • Fully equipped practice machines.
  • 70% practicals
  • Internet access
  • Weekly tests and Quizzes
  • Online fee payment available
  • Max 1:14 Teacher Students ratio
  •  Includes Offline/Online Training + Exam + Certification + Job assistance
  • We provide assistance for international certifications as well.

Weekends Classes

  • Course duration is 60 hours
  • No time limitation for practice
  • 5 hours each on Saturday Sunday
  • Doubt clearance sessions
  • Fully equipped practice machines.
  • 70% practicals
  • Internet access
  • Weekly tests and Quizzes
  • Online fee payment available
  • Max 1:10 Teacher Students ratio
  •  Includes Offline/Online Training + Exam + Certification + Job assistance
  • We provide assistance for international certifications as well.

Why TRUEPHERS' Training​ ?

  • Government registered organization
  • Offensive Security certified trainers
  • Core Ethical Hacking | Nothing else
  • Best Ethical Hacking institute in Chandigarh, Mohali
  • Lowest fees but unlimited learning
  • No extra fee for exam and certification
  • 100% Job assistance and interview scheduling
  • Guaranteed lowest fees than others
  • Tailored made training courses available
  • Free personality development training session
  • ISO certified training center
  • No time limit for practice | Full day lab access
  • Full satisfaction of students guaranteed
  • Group discounts | Learn with your friends and colleges

Learn from Experts

Our Trainers are Offensive Security Certified Professionals. Having a vast experience in Penetration Testing and Teaching as well. 

Be A Truephers Certified

Learn from Industry Leader and get Certified with Truephers. 

Goodies takeaway

Certificate

Students who clear the Exam with atleast 70% marks gets the certification + Goodies. If fails, she can retake Examination at a nominal fee of Rs 300.

Toolkit

Students who enroll for this course gets the latest version of free, trial and community editions of tools, used during the training.

E-Book's

Students who enroll for this course gets the latest version of free and community editions of ebooks used during the training.

Full Job Assistance

Every Student who cleares the Exam gets full job assistance till she gets her first job.

Meet Our Training Lead

Harjeet Singh Baidwan

Training head & CEO

Harjeet Singh Baidwan is a name among top Cyber Security enthuasists.

Meet us at:

F-28, Top Floor, Phase 8, Industrial Area, S.A.S Nagar, Mohali, Punjab 160071

Call us

+91 73 994 994 73

E Mail us

info@truephers.com

Make us Call You

WHATSAPP US FB Messenger +917399499473