CVP (Certified VAPT Practitioner)

CVP (Certified VAPT Practitioner)

Course Description

This advanced course delivers the skills to effectively conduct VAPT, secure web applications, networks, and much more. Ideal for IT professionals looking to excel in cybersecurity.

Course content

Level Advance

13 Modules

80 hrs.

1. Introduction to Penetration Testing

7 topics
  1. Introduction
  2. Importance of Penetration Testing
  3. Difference Between VA & PT
  4. Types of Penetration Testing
  5. Phases of Penetration Testing
  6. Penetration Testing Checklist
  7. Do’s and Dont’s
  1. Installing Kali Linux
  2. Configuring Virtual Machines
  3. Understanding Basic Linux Commands
  4. Home Lab vs Cloud Lab
  5. Advantages and Challenges
  6. Overview and Setup of Vul Machines
  1. Introduction
  2. Footprinting Goals
  3. Google and Shodan Dorks
  4. Whois Footprinting
  5. Website Footprinting
  6. Email Footprinting
  7. Footprinting through Social Networking Sites
  8. CMS Footprinting
  9. Footprinting Tools
  1. Categories of VAPT Tools
  2. Key VA Tools (Nessus, etc)
  3. Key PT Tools (Burpsuite, etc)
  4. Auxillary Tools (Hydra, etc)
  5. Best Practices
  1. What is Vulnerability Assessment?
  2. Vulnerability Scoring System
  3. Vulnerability Management Life Cycle
  4. Types of Vulnerability Assessment
  5. Types of Vulenerability Assessment Tools
  6. Best Practices
  1. A01:2021-Broken Access Control
  2. A02:2021-Cryptographic Failures
  3. A03:2021-Injection
  4. A04:2021-Insecure Design
  5. A05:2021-Security Misconfiguration
  6. A06:2021-Vulnerable and Outdated Components
  7. A07:2021-Identification and Authentication Failures
  8. A08:2021-Software and Data Integrity Failures
  9. A09:2021-Security Logging and Monitoring Failures
  10. A10:2021-Server-Side Request Forgery
  11. Subdomain Takeover
  12. Misconfigured S3 Buckets
  13. HTTP Parameter Pollution
  14. LFI / RFI
  1. Introduction
  2. Automated Analysis
  3. Manual Code Review
  4. Best Practices in Source Code Auditing
  5. Reporting
  1. Network Infrastructure
  2. Lab Setup
  3. Active & Passive Information Gathering (DNS, Nmap etc)
  4. Vulnerability Scanning (Nessus)
  5. Exploitation Techniques & Tools (Metasploit, Meterpeter, Auxillary, etc)
  6. Exploiting Specific Ports (FTP, SSH etc)
  7. Post Exploitation
  1. AD Overview
  2. AD Components
  3. Domain Controllers Overview
  4. AD Lab Setup
  5. AD Exploitation
  6. Gaining Shell Access
  7. IPv6 Attacks
  8. Countermeasure
  1. Definition and Importance
  2. Objectives of VAPT Reports
  3. Formatting & Guidelines
  4. Tools for VAPT Reporting
  5. Case Study
  1. Introduction to Android Pentest
  2. Methodology
  3. Lab Setup
  4. Application Security
  5. ADB Basics and commands
  6. Static Analysis
  7. Dynamic Analysis
  8. OWASP Top 10
  1. Introduction
  2. Understanding Assembly Basics
  3. Static vs Dynamic
  4. Tools for Reverse Engineering
  5. Best Practices
  1. Introduction to OSINT
  2. Ethical and Legal Considerations
  3. Techniques and Tools
  4. Social Media Intelligence
  5. OSINT Tools Overview
  6. Advance OSINT Techniques
  7. Hands-On Task

Price

₹65,000.00

Discount - 20 %

-₹13,000.00

Total

₹52,000.00


Course Level

Advance

Total Modules

13

Duration

80 hrs.