Duration

30 Hours(For Regular Course)

4-8 Hours(For Capsule Course)


Enroll Now

Request more information




Advanced Penetration Testing

This web-based training course on Advanced Penetration Testing functionality, administration and development, is available online to all individuals, institutions, corporates and enterprises in India (New Delhi NCR, Bangalore, Chennai, Kolkatta), US, UK, Canada, Australia, Singapore, United Arab Emirates (UAE), China and South Africa. No matter where you are located, you can enroll for any training with us - because all our training sessions are delivered online by live instructors using interactive, intensive learning methods.


Advanced Penetration Testing, Exploit Writing Assessing and Exploiting Control Systems is the complex level for those who already have an experience in penetration testing. The course focuses upon giving students a deep insight of real time attacks carried out by highly experienced penetration testers. The advanced level of penetration testing involves testing against vulnerable network devices such as routers, testing cryptographic implementations, exploiting different environments using virtualization and writing and assessing exploits against applications. The institute is offering its web based Certification course to all the major locations in India as well as other locations globally.


Network Attacks for Penetration Testers

  • Getting pass network access/admission control (NAC)
  • Real Time Impersdevices with admission control policy exceptions
  • Exploiting EAP-0MD5 Validation
  • Custom network protocol manipulation with Ettercap and filters
  • Various techniques and procedures for gaining man-in-the-middle network access
  • IPv6 in Penetration Testing
  • Exploiting OSPF authentication to infuse malicious routing updates
  • Making use of Evilgrade to hit software updates
  • Getting over SSL transport encryption security with Sslstrip
  • Remote Cisco router configuration file recovery

Crypto, Network Booting Attacks, and Escaping Restricted Environments

  • Penetration testing cryptographic executions
  • Exploiting CBC bit flipping susceptibilities
  • Exploiting hash length extension vulnerabilities
  • Distributing malicious operating systems to devices through PXE and network booting
  • Advanced Overview of PowerShell
  • Enterprise PowerShell
  • Post Exploitation with PowerShell and Metasploit
  • Evading Software Restrictions
  • Two-hour evening Capture the Flag exercise using PXE, network attacks, and local privilege escalation

Python, Scapy, and Fuzzing

  • Acquainting with Python types
  • Controlling Python modules for implementation in Penetration Testing tasks
  • Manipulating stateful protocols using Scapy
  • Making use of Scapy to develop a wireless data leakage tool
  • Testing Security of Product
  • Utilizing Taof for quick protocol mutation fuzzing
  • Improve your fuzzing time through smart target selection
  • Using Sully for Automating target monitoring while fuzzing
  • Leveraging Microsoft Word macros for fuzzing .docx files
  • Block-based code coverage practice using Paimei

Exploiting Linux for Penetration Testers

  • Stack and dynamic memory management and allocation on the Linux OS
  • Breaking down a binary and examining x86 assembly code
  • Performing symbol resolution on the Linux OS
  • Recognizing susceptible programs
  • Code execution redirection and leaks in memory
  • Spotting and evaluating stack-based overflows on the Linux OS
  • Performing return-to-libc (ret2libc) attacks on the stack
  • Return-oriented programming
  • Evading stack protection on the Linux OS
  • Going pass ASLR on the Linux OS

Exploiting Windows for Penetration Testers

  • The condition of Windows OS security on Windows 7, 8, 10, Server 2008 and 2012
  • Getting acquainted with common Windows constructs
  • Stack exploitation on Windows
  • Avoiding OS security added to Windows
  • Developing a Metasploit module
  • Advanced level stack-smashing on Windows
  • Bringing ROP to use
  • Creating ROP chains to get pass DEP and avoid ASLR
  • Windows 7 and Windows 8 exploitation
  • Porting Metasploit components
  • Exploitation on Client-side
  • Windows Shellcode

Hackers are becoming cleverer with every passing day on the Internet and this has resulted in development of advanced aspects of penetration testing exploit writing and exploiting control systems. There are very few courses that discuss penetrating testing in such depth and this course is one of them. In scenarios when the cyber attacks and threats are continuously rising there is an immense need of penetration testers who are educated about the pro level techniques not just the basic knowledge. To increase your knowledge-base further in this particular domain a Certification training course on Advanced Penetration Testing, Exploit Writing Assessing and Exploiting Control Systems can be really fruitful.

1. Are lab-sessions available after theory sessions?

We provide online lab facilities to all our students, wherever possible & applicable, using a combination of one or more options, including global ASP setups, live-environments, real-time simulations, training-videos, PPTs, Screenshots and others.

2. Who and how qualified are the instructors?

All our instructors go through a rigorous and multiple processes of filtering and selection before they are appointed by us. Only the most qualified, most experienced and best suited candidates are chosen as instructors.

3.What are the machine requirements for the course?

You must have a fairly good desktop PC or laptop. You can even access these courses on your tabs or smart phones. For PCs and laptops the configuration should be at-least an Intel Pentium processor, 4GB of RAM and 50 to 100 GB of free hard disk space. You must also have a good and steady WiFi internet connection which works at 3G or 4G speeds.

4.How will I undergo practical training in the course?

Depending on the type of lab facilities available for the course you have enrolled in for our instructor would be happy to help you in your lab sessions.

5.What is the process to get my questions/queries answered?

Get in touch with your trainer. You can also consult your batch-mates. We believe in collaborative and practical learning.

6.Can a free demo session be provided?

We do not provide free demo sessions.

7.Will there be a provision for repetition if I miss a class?

We encourage our trainees to attend all sessions. If you have missed a session we will try out best to update you on it, if possible. Else you will need to pay a small fee to have a repeat session arranged specifically for you.

8.Does your organization provide assistance in job hunting?

We are connected across the industry in India and abroad. We will pass on any job openings from our customer to our trainees. But we are not a manpower placement provider.

9.How and where can I make the payment?

You can pay using any credit or debit card in India or abroad. You can also pay using your PayPal account.

10. Will practice material or tests be also provided with the course?

Yes. As required & as applicable.

11.What is the minimum or maximum batch size?

Minimum/maximum batch sizes vary from course to course, depending upon a number of factors. It can vary from as few as 2 to as many as a few hundred, in some cases. But that number does not impact the quality of training that we deliver due to our tight quality-control mechanisms.

All trainees will be provided with a course participation and completion certificate by Aurelius Corporate Solutions. Please note, we are an independent provider of learning solutions. We are not affiliated in any manner to any company or organization.

Copyright © 2016 Aurelius Corporate Solutions Pvt. Ltd. All Rights Reserved.