Tutelr Infosec Private Limited
Certification in Enterprise Penetration Testing
IT & Software (Computer Science & IT)
Shortlisted by 111+ Students
Location: Chennai
Duration: 45 DAYS
Regular / Offline
Average Fees: ₹ 30000
Highlights TIAC-TPEN is designed to get you ready to conduct a full-scale, high-value penetration test, and at the end of the course you’ll do just that. After building your skills in comprehensive and challenging labs, the course culminates with a final real-world penetration test scenario. You’ll conduct an end-to-end pen test, applying knowledge, tools, and principles from throughout the course as you discover and exploit vulnerabilities in a realistic sample target organization. As a cybersecurity professional, you have a unique responsibility to identify and understand your organization s vulnerabilities and work diligently to mitigate them before the bad actors pounce.
Syllabus
SECTION 1: Comprehensive Pen Test Planning,Scoping, and Recon
TOPICS : The Mindset of the Professional Pen Tester; Building a World-Class Pen Test Infrastructure; Creating Effective Pen Test Scopes and Rules of Engagement; Detailed Recon Using the Latest Tools; Mining Search Engine Results; Reconnaissance of the Target Organization, Infrastructure, and Users; Automating Reconnaissance with Spiderfoot.
SECTION 2:In-Depth Scanning and Initial Access
TOPICS: Tips for Awesome Scanning; Nmap In-Depth: The Nmap Scripting Engine; Version Scanning with Nmap; False-Positive Reduction; Netcat for the Pen Tester; Gaining Initial Access; Password Guessing, Spraying, and Credential Stuffing; Exploitation and Exploit Categories; Exploiting Network Services and Leveraging Meterpreter
SECTION 3 :Assumed Breach, Post-Exploitation, and Passwords
TOPICS: Assumed Breach Testing; Post-Exploitation; Situational Awareness on Linux and Windows; GhostPack s Seatbelt; Password Attack Tips; Retrieving and Manipulating Hashes from Windows, Linux, and Other Systems; Extracting Hashes and Passwords from Memory with Mimikatz Kiwi; Effective Password Cracking with John the Ripper and Hashcat; Poisoning Multicast Name Resolution with Respond
SECTION 4: Lateral Movement and Command & Control (C2)
TOPICS: Lateral Movement; Running Commands Remotely; Attacking and Abusing Network Protocols with Impacket; Command and Control (C2) Frameworks and Selecting the One for You; Using the Adversary Emulation and Red Team Framework, Sliver; Post-Exploitation with [PowerShell] Empire; Anti-Virus and Evasion of Defensive Tools; Application Control Bypasses Using Built-In Windows Features; Implementing Port Forwarding Relays via SSH for Merciless Pivots; Pivoting through Target Environments with C2
SECTION:5: Domain Domination and Azure Annihilation
TOPICS: Kerberos Authentication Protocol; Kerberoasting for Domain Privilege Escalation and Credential Compromise; Persistent Administrative Domain Access; Obtaining NTDS.dit and Extracting Domain Hashes; Golden and Silver Ticket Attacks for Persistence; Additional Kerberos Attacks including Skeleton Key, Over-Pass-the Hash, and Pass-the-Ticket; Effective Domain Privilege Escalation; Azure and Azure AD Reconnaissance; Azure Password Attacks and Spraying; Understanding Azure Permissions; Running Commands on Azure Hosts; Tunneling with Ngrok; Lateral Movement in Azure; Effective Reporting and Business Communication
SECTION 6:Penetration Test and Capture-the-Flag Exercise
TOPICS: Applying Penetration Testing and Ethical Hacking Practices End-to End; Detailed Scanning to Find Vulnerabilities and Avenues to Entry; Exploitation to Gain Control of Target Systems; Post-Exploitation to Determine Business Risk; Merciless Pivoting; Analyzing Results to Understand Business Risk and Devise
How Promilo Works for Students
College Search Made Easy, Find the Right College for You in Minutes, Not Months!
Search your Career Goal
Discover courses, internships, and jobs that sync with your goals.
Register for Free
Get access to premium features and connect directly with experts. You're all set!
Book a Free Meeting
Schedule a free online meeting or talk to experts Jump into a meeting with pro-experts. We got you!
Stack Up Rewards
Your time is valuable, and we appreciate every moment you spend with us. That's why we continue to reward you for your engagement.