VAPT Course
VAPT Course
VAPT Course
Vulnerability Analysis and Penetration testing helps organizations evaluate their security
posture and understand their ability to withhold cyber-attacks against digital infrastructure.
Day 1:
Introduction to VAPT
VAPT Methodologies
Day 2:
This module covers the Web Application Penetration Testing (WAPT) that provides all the advanced
skills necessary to carry out a thorough and professional penetration test against modern web
applications.
Tools:
Day 3:
• Fundamentals of VA
• VA tool Deployment strategy
• Scanning methodologies
• Risk Identification and Categorization
• Penetration testing concepts
• Penetration testing methodology
• Types of Penetration testing
• Tools and techniques used in penetration testing
• Limitations of penetration testing tools
• Hands-on practice on tools used in penetration testing.
Tools:
o Dirsearch
o LinkFinder
o Waybackurls
o ParamSpider
o FFUF
o LFISuite
o SSRFmap
o Sqlmap
o Dalfox
o retire.js
Network Security:
• IPS Introduction
• Types of IPS
• Classification of IPS
• Comparison of IPS Technologies
• Detection methods of IPS
• IDS Introduction
• How does an IDS work
• Classification of IDS
• Benefits of IDS
• Detection methods of IDS
Tools:
• Nmap
• Nessus
• Wazuh
• ManageEngine Log360
Day 4:
• Introduction to SOC
• Understanding Events and logging mechanisms
• Incident Detection with Security Information and Event Management (SIEM)
• Enhanced Incident Detection with Threat Intelligence
• Incident Response Activities
• Experience in using SIEM tools.
Malware Analysis
• This topic explains the unique features, objectives, sources and potential effects of
• harmful software code.
• Implement different malware analysis techniques.
• Analyze the malware behavior in windows and android.
• Understand the purpose of malware analysis.
• Identify the various tools for malware analysis
• Benefits of Malware Analysis
• Types of Malware Analysis
• Dynamic
• Static
Tools:
• HexEditor
• Peid
• Ollydbg
• ImpRec
• IDApro -
Job Role
After the successful completion of this course, candidates will be eligible for applying the following job
roles:
• Ethical Hackers
• Penetration Testers
• Network Server Administrators
• Firewall Administrators
• Cyber Security Consultants
• Security Testers
• Security Analysts
• Security Engineers
• System Administrators
• Risk Assessment Professionals
• Malware Analyst