Best Apache Network Penetration TestingTraining in Jalandhar & Best Network Penetration Testing Industrial Training in Jalandhar


Introduction to Penetration Testing

  1. What is Penetration Testing
  2. Basics of Penetration TestinG
  3. Types of Penetration Testing
  4. Steps of Penetration Testing
  5. Goals to Achieve the Penetration Testing
  6. Methodologies of Penetration Testing

Working on Network Technologies (Using Packet Tracer)

  1. Introduction to Networks (basics)
  2. Difference between OSI and TCP model
  3. IP addressing in depth
    1. Demo of Three Way Handshaking
    2. What is an IP?
    3. Types of Address
    4. Public IP address
    5. Private IP address
    6. Demos of Public and Private IP address
    7. Calculation of subnets/Subnet Mask
  4. Usage of Switches/ Routers/Hubs in practical scenarios
  5. Building up of Network Topologies
  6. Collisions and Broadcast Domains

Routers in Depth (Demos in Packet Tracer)

  1. What are Routers??
  2. Routing in details
  3. Tools for networking
  4. Static and Dynamic Routing
  5. OSPF (open shortest path first)
  6. RIP (Routing Information Protocol)
  7. EIGRP (Enhanced Interior gateway Routing Protocol)

Switches in depth (Demos in packet tracer)

  1. Working of a Switch
  2. LAN Switching
  3. CSMA/CD
  4. VLANs (in depth)
    1. Introduction to VLAN’s
    2. Access Ports and Trunk Ports
    3. Configuring VLAN’s in Packet Tracer
    4. Native VLANs
    5. Inter-VLAN Routing
  5. Switch Security
  6. Port Security
  7. VTP (Virtual LAN Trunk Protocol)
    1. Working of VTP
    2. VTP modes
    3. Configuring of VTP
  8. STP (Spanning Tree Protocol)
    1. Working of STP
    2. Configuring of STP
  9. NAT (Network Address Translations)
    1. What is NAT?
    2. Real-time Scenarios of using NAT
    3. Types of NAT
    4. Configuring of Static NAT
  10. DHCP (Dynamic Host Configuration Protocol)
    1. Introduction to DHCP
    2. Configuring of DHCP


  1. Introduction to Ports
  2. Working of Ports
  3. Types of Interfaces and ports
  4. Scanning of Ports (using Nmap and Nessus)
  5. Demo of Services running on ports

OS Hardening for Penetration Testing

  1. Introduction to LINUX
  2. Basic commands usage in LINUX
  3. Programming Basics in LINUX
  4. Cracking of roots in LINUX
  5. Difference between LINUX and windows

ARP (Address Resolution Protocol)

  1. Introduction to ARP
  2. Working of ARP
  3. Traffic Analysis (Using Wireshark)
  4. Introduction to Sniffing
  5. Demonstration

DOS AND DDOS (Denial of Service and Distributed Denial of Service)

  1. Introduction to Denial of Service
  2. Introduction to Distributed Denial of Service
  3. Difference between both of them
  4. Practical Demonstration of DOS
  5. Practical Demonstration of DDOS
  6. IPSEC Policy
    1. Introduction to IPSEC
    2. Depth Study of IPSEC
    3. Creation of Policy to protect against DOS attacks


  1. Introduction to Cryptography
  2. Symmetric Key Cryptography
  3. Public Key Cryptography
  4. Methodologies of Cryptography
    1. Mono-alphabetic
    2. Ceaser-Cipher
    3. Advanced Ceaser Cipher
    4. Poly-alphabetic
    5. Vignere
    6. Auto-key
    7. Morse Code
    8. Transposition Cipher
    9. Rail-Fence Cipher
    10. Route-Cipher
    11. Cryptanalysis of Ciphers (Using Frequency Analysis)
  5. Fiestal Ciphers
  6. DES (Data Encryption Standards)
  7. Introduction to DES
  8. Working of DES
  9. Round Structure of DES
  10. Key Management Structure
  11. Demonstration of DES
  12. Double DES
  13. Meet In the Middle Attack
  14. AES (Advanced Encryption Standards)
  1. Introduction to AES
  2. Working of AES
  3. Round Structure of AES
  4. Key Management Structure
  5. Demonstration of AES
  6. Vulnerabilities of DES and AES
  7. Exploiting the vulnerabilities to AES and DES
  8. Hash Functions
  9. Introduction to Hash Functions
  10. SHA (Secured Hash Algorithms)
  11. MD5 (Message Detection Algorithms)
  12. Attacks on Hash Functions

Intrusion Detection System

  1. Introduction to Intrusion Detection System
  2. Types of Intrusion detection System
  3. Working of Intrusion Detection System
  4. Practical Demonstration of Intrusion Detection System
  5. Generating Alerts even on PING attacks
  6. Track Down of Attacker

In-depth Intrusion Detection System

  1. Introduction to AIDE
  2. Working of AIDE
  3. PGP and GPG Encryptions
  4. Demonstration of AIDE
  5. Detection of Added Trojans or viruses by attackers
  6. Audition of Any file

Wireless Penetration Testing

  1. Introduction to Wireless
  2. Types of Wireless Networks
  3. Working of Wireless Networks
  4. Working of Frequencies
  5. Multiplexing
  6. Divisions of Multiple Access
  7. FDMA
  8. CDMA
  9. TDMA
  10. In depth Study of WEP/WPA/WPA2
  11. Handshaking of Open Authentication
  12. 3-way Handshaking of WEP
  13. 4-way Handshaking of WPA/WPA2
  14. Vulnerabilities of WEP/WPA/WPA2
  15. Exploitation of WEP/WPA/WPA2

Generation of Report