Infra Pentesting
Infra Pentesting
PENETRATION TESTING
www.ignitetechnologies.in
Infrastructure Penetration Testing
This is exclusive training provided by Ignite technologies worldwide to provide realistic exposure
for Vulnerability Assessment and Penetration Testing as per Industry requirements.
The course will complete a focused manual Penntesting to identify the logical threats that
cannot be identified by automated tools.
Designed based on the most common penetration testing services provided by the penetration
testing service providers and consulting firms in the market including Network, Application,
Android, Database, Docker, and CTFs.
TRAINING TYPE
01
Type 1
A GROUP SESSION will have a maximum
of 10 candidates.
02
Type 2
A PERSONALISED SESSIONS will
one-on-one session
• Learn Techno Commercials and Secure Implementation of Servers, Network Devices & Applications.
• Meet The Business Standards of Report Deliverables Maintain the security posture by adhering to industry
best practices.
• Work-in Professional Red Teamers and Pentesters around the world will be conducting all sessions live.
• Follow OWASP and NIST standards for how to respond to the attack.
WHO WHY
AN
College Students Level up each candidate by providing the
IS/IT specialist, analyst, or manager fundamental knowledge required to begin the
IS/IT auditor or consultant Sessions.
IT operations manager Hands-on Experience for all Practical
Network security officers and Sessions.
Practitioners Get Course PDF and famous website links for
Site administrators content and Tools
Technical support engineer Customized and flexible training schedule.
Senior systems engineer Get recorded videos after the session for each
Systems analyst or administrator participant.
IT security specialist, analyst, manager, Get post-training assistance and backup
Architect, or administrator sessions.
IT security officer, auditor, or engineer Common Platform for Group discussion along
Network specialist, analyst, manager, with the trainer.
Architect, consultant, or administrator Work-in Professional Trainer to provide realtime
exposure.
Get a training certificate of participation.
PREREQUISITES
In order to initiate the vulnerability Assessment & pen-testing Training, the Candidate should be aware of
the basic concepts of Ethical Hacking. This course is for beginners and needs to know setting up vmware
and kali linux
Module 1
Rule of Engagement
Module 2
Internal & External Network Pentest
Module 3
Web Application
Pentest
Module 8
Android Pentesting
Bonus Section
Advance Nmap
Module 5 Module 4 Advanced
Linux for Pentester
Windows for
Metasploit
Pentester
Module 6
MSSQL Grey Box Testing
Module 7
Network Device security Aduit
MODULE 1
Rule of Engagement
The Rules of Engagement (RoE) is a document that outlines how the penetration test
should be carried out. Before beginning the penetration test, certain guidelines that
should be included in RoE are as follows:
Learning Objectives
• Establishing Goals, Objectives, and Deliverables for Penetration Testing Engagement
• Outlining Scope for Lines of Business, Third Parties, and Structuring Compensation and
Metrics For Time Estimation
• Standards Of Operations
MODULE 2
There are several factors that might warrant an internal and external network penetration
study for your firm or organisation. Reducing and perhaps even minimising the adverse
effects on your information assets is the main goal. An unscrupulous hacker will locate and
take advantage of a flaw in your network if they have enough time, sophisticated tools, and
expertise.
• Information Gathering
• Man-in-the-Middle Attack
• Network Report Writing by defining real risk impact with CVSS and CWE
MODULE 3
Learning Objectives
• OWASP Top 10 and WSTG Testing Guide, Principal of testing and approach.
• Web Report Writing by defining real risk impact with CVSS and CWE
During the threat modelling phase, the organisation may engage a pentester to do
authenticated testing in order to verify an account's authorization and identify internal
threats brought on by illegal access. The teacher will concentrate on internal threats
throughout the lesson and attempt to map the threats by providing CTFs to enhance
the expertise.
Learning Objectives
• Remote Connection via SMB in multiple methods.
• Privilege Escalation-Manual
• Lateral Movement
BUY 1 GET 1
HURRY UP!
Enroll NOW
MODULE 5
During the threat modelling phase, the organisation may engage a pentester to do
authenticated testing in order to verify an account's authorization on a Linux platform
and identify internal threats brought on by illegal access. The teacher will concentrate
on internal threats throughout the lesson and attempt to map the threats by
providing Linux-based CTFs to enhance the expertise.
Learning Objectives
• Fundaments of Linux permission and privileges
• Privilege Escalation
A pentester with limited knowledge may face challenges to meet the business
requirement. Here the instructions will provide cooked steps to follow the industry's
best practices for Network Security Audits.
Learning Objectives
• Router vulnerability assessment and config review
MODULE 7
Android Pentesting
• Genymotion
MODULE 8
Bonus Section
The Bonus section will provide in-depth knowledge of industry-leading tools without
them penetration is impossible. The instructor-led training will ensure the to provide
the capability of these tools and automate manual pen-testing through them.
Learning Objectives
• Nmap NSE Scripts
• Responder
• BurpSuite
• OwaspZap
CONTACT US
Phone No.
+91 9599 387 41 | +91 1145 1031 30
WhatsApp
https://wa.me/message/HIOPPNENLOX6F1
EMAIL ADDRESS
[email protected]
WEBSITE
www.ignitetechnologies.in
BLOG
www.hackingarticles.in
LINKEDIN
https://www.linkedin.com/company/hackingarticles/
TWITTER
https://twitter.com/hackinarticles
GITHUB
https://github.com/ignitetechnologies