Advance Penetration Testing
Advance Penetration Testing
Advance Penetration Testing
nce
Pene
tra
tionT
e s
ti
ng
Pr
ogr
amforPentestingExperts
Ac
cel
era
teYourCa
reer
I
nPenet
rat
ionT
est
ingwi
th
Dat
aspac
eAc
ademy
Pene
tra
ti
TABLEOF
on
Con
ten
ts
1 Cour
seOv
ervi
ew
WhatisAdvanc
ePenet
rat
ionT
est
ingPr
ogr
am?
2
Whyisiti
mportant
?
3 WhichI
ndustri
esAr
eLooki
ngForSeni
orPenet
rat
ionT
est
ing
Pr
ofess
ional
s?
4 HowDoesDat
aspac
eAc
ademyHel
pYourCar
eer
?
5 WhoShoul
dEnr
oll
inThi
sPr
ogr
am
6 L
ear
ningPat
h
7 Pr
ogr
amCur
ric
ulum
8 T
ool
s&Ski
ll
sCov
ered
9 Car
eerTr
ans
iti
ons
10 Car
eerOppor
tuni
ti
es
11 Meet
-up-
wor
kshops
12 Hearf
romOurL
ear
ner
s
13 Pr
ogr
amDet
ail
sandAdmi
ssi
onPr
oces
s
14 Ac
ademi
cDet
ail
s
3
Cour
seOv
ervi
ew
TheAdvanc ePenetrationTesti
ngProgrambyDat aSpaceAc ademyi sspecial
lydesigned
forcyber
s ec
uri
typrof essi
onalswhoaspiret
os c
aleupt othee xecut
ivelevel.
Thec ourse
will
bebenefic i
alf
orl earnerswhohavec omplet
edt hePenetrationTesti
ngPr ogramand
Cybersecuri
tyEssentialsProgramf
romDat aSpaceAc ademy .
Thisinteract
iveprogramc oversin-depthanalysisonallt
hek eyaspect
sofPenetrati
on
Testi
ngl i
keNet wor kPenetrat
ionT esti
ng,Cl oudPenetrati
onT es
ting,
WebAppl icati
on
Penet r
ationTesti
ng,andAndr oidPenet rat
ionT est
ing.
Learnerswillat
tainext
ensi
v e
trai
ningwi t
hhands -onexposuret ocrit
icalpentesti
ngtoolsandtechnologi
esli
keNikto,
NMap, Metasploi
t,BurpSuit
e,andmor e.
Ourc oursehasbeenst
rategi
cal
lydesi
gnedtoempowerpent
esti
ngengi
neer
switht
he
cut
ting-edgeski
ll
sneededtodetectandres
olv
eextr
emelycr
iti
calandc
ompli
cat
ednet
-
Pr
ogr
amHi
ghl
i
ght
s
1 T
op-
Not
Upgr
chCur
adedc
ri
ur
c
ul
r
ic
umWi
ul
thI
nt
umdev
e
gr
el
at
edL
abs
opspr
ac
:
t
ical
ski
ll
snec es
saryforst
udent
stos
ucc
eed
i
nmakingasucces
sful
car
eerasaseni
orpentes
tingengineer
.
Foc
usonindust
ry-
rel
Obt
ai
evantadvanc
ni
ndus
t
edpent
r
es
y-
t
r
i
el
e
ngs
vantt
ki
ll
s,
rai
ning:
knowledge,
and 2
toolst
hatarerequiredtobegi
nacareeri
npenetrat
iontest
ing.
3 Onl
L
ine
ear
/Of
fli
neasi
l
neMas
yvi
t
afle
er
c
xi
las
bl
sDe
e,
li
eas
v
e
y-
r
t
e
dByI
o-s
c
ndus
t
hedul
ryExpe
eonl
i
r
ne/
t
of
s
:
fli
nes
ess
ionsf
ora
wholes
omelearni
ngexperi
enc
e.
Thes
einnovat
ivel
ear
ni
Exc
ngs
l
es
us
s
i
iveAs
k-
onsal
l
Me
-
ows
t
Anyt
hi
udent
ngSe
st
s
odi
s
s
c
i
ons
us
:
sthei
r 4
doubts
.
5 I
ndus
tr
Candi
y-
r
dat
ec
ogni
esr
ec
se
ei
v
dCe
ei
rti
fic
ndus
tr
at
e
y-
r
:
ec
ogni
sedc
ert
ific
atesatt
heendoft
he
cour
se.
Theintegrat
edc apst
Caps
oneproj
t
ec
oneAndI
tsc ar
r
ndus
tr
youti
y-
Rel
evantPr
oje
c
ndependentgr
ts
:
oupresear
chto
6
devis
eani nnovat
ives
oluti
onf orareal
-worldprobl
em, ther
ebyhelpi
ng
l
earnerstobui
ldprofessi
onalpentest
ingski
ll
s.
7 De
di
Rec
c
at
ei
v
e
dPl
ec
ace
me
ompl
ntAs
et
s
epl
is
t
ac
anc
e:
ements uppor
t,c
over
ingint
ervi
ewswi
thhi
ri
ng
manager
storesumebuil
ding,
andmuc hmore.
4
WhatisAdva
ncePene
tra
tionT
est
ing
?
Whyisiti
mport
ant
?
Advanc edPenetrati
onT esti
ngmaj orl
ydealswit
hhandl i
nghighl
yc omplexinfor
mation
securi
ty vulnerabi
lit
ies that cannot be handled with basi
c penetrati
on tes
ting
procedures.Putsimply,advancedpentesti
ngmet hodsdelvemuchdeepert hanaplain
vulnerabi
lit
yscanthatyous eewithcommonpas swordiss
uesandratherwor kwit
hmor e
complicatedmattersli
keenc r
yptionbugs,
vulner
abili
ti
esinbusi
nesslogi
c,andsoon.
AdvancedPenet
rati
ontest
ingdeal
swi
thabroadumbrel
laofsecur
ityt
hreats
,inc
ludi
ng
butnotli
mit
edtoransomware,
syst
emmis
configurat
ions
,phi
shing,
andmor e.
Fact
sand fig
ure
shi
ghl
ig
hti
ng t
he i
mpor
tanc
e ofpe
net
rat
ion t
est
ing and adv
anc
ed
pent
est
ers
.
ThePenetr
ationTesti
ngindus
tryi
spr
edi
ctedt
oreac
har
ound4.
5bi
ll
ionUSDbyt
he
year2025(
Sourc
e:Gar
tne
r)
By2030,
cyber
cri
mesar
eexpec
tedt
ocaus
e$433bi
ll
ioni
nlos
sesac
ros
sthegl
obe.
(
Sour
ce:
Cos
tof
aDat
aBr
eac
hRe
por
t2021)
Exper
ienc
edore
xec
uti
ve-
lev
elpent
est
ersear
nov
er19l
akhsI
NR
(
htt
ps:
//
www.
ambi
ti
onbo
x.c
om/
)
Ther ec
entmassi
vegr owthindatacentresandc ybertechnologyisleavingor
gani
sati
ons
andbus i
ness
esvulnerabletocri
ti
calcybert hr
eats.Thesethr eatscouldposemammot h
dangerespeci
all
yforor gani
sat
ionsthatdealwi thextremelys ens i
ti
vedatali
kefintech
organis
ati
onsordefencedepartments.Unf ort
unately
, t
radit
ional anti
-vi
russ
ecur
ityand
firewall
sarenotequippedenoughtopr ovideoptimumpr ot
ec ti
onanymor e.
Thes ol
utiontofixingthi
ssi
tuati
oniswor ki
ngones tepaheadofhackerswithpenet
rat
ion
tes
t i
ng.Thepent est
ingmethodwor ksbylaunc
hingas afesi
mulatedattac
konanet work
sys
t em t
odet ectthenetworkvulnerabi
lit
iess
ot hatthesystem bugscanbeelimi
nated
beforeit
’stoolate.
WhichIndust
ri
esAreLookingForSeni
orPene
tra
tion
Tes
tingSecur
ityEng
ineer
s?
AdvancedPenet
rat
ionTes
tingSecur
ityEngineer
sareinhi
ghdemandinawi
der angeof
i
ndustr
ies,
espec
ial
lyt
hoseorgani
sat
ionsthatdealwi
thconfident
ial
ands
ens
iti
vedata.
Seni
orPenet
rat
ionT
est
ingpr
ofes
sional
sar
ehi
redi
nthef
oll
owi
ngfiel
ds:
Fi
nanc
e Pr
oduc
t-bas
edc
ompani
es
Fi
ntec
h Heal
thCar
e
I
TES L
ogi
sti
cs
Ser
vic
e-bas
edc
ompani
es Manuf
act
uri
ng
Manuf
act
uri
ng
6
Ho
wDoesDa
tas
paceAca
demyHel
pYourCa
reer
?
Dataspace Academy isone oft he leading I
Tt raini
ng pr
ovider sdeli
veri
ng quali
ty
educati
onac r
os sthec ountryandov ers
eas.Wear eonami ssiont oprovi
dequal i
ty
educati
ontodes ervi
ngc andidates.DataspaceAc ademyhasc reatedindustr
y-r
elevant
coursesi
ncoll
aborationwitht optrai
nersandment ors,
makingours tudentst
heperfect
candi
dateforcyberforensic
sr ol
esinleadingorganisati
onsacr
os stheglobe.
Ourt r
ainingpr ogram i
shelpingi ndividual
st odev elopt hel atests ki
ll
si nthemos t
engagingl earningenvir
onment .Theac ademyhast rainedst udent sandpr ofess
ional
s
ali
ke,helpingt hem inmakingac areeri ncybersecurit
y .Ourc our sesaredeliveredby
leadingeduc atorsandourt r
ainingpr ogram enablesqui cklearningofdi fficulttopi
cs.
Bes i
des,student sgett
echni
calandpl acementas si
stancet ohelpl earner
st ojump- s
tar
t
theircareers.
Upont
hec
ompl
e onoft
hispr
ogr
am,
youwi
l
l:
Rec
eiv
eac
ert
ific
ati
onofc
ompl
eti
onf
romDat
aspac
eAc
ademy
Rec
eiv
elear
ningmat
eri
alsf
romf
acul
tyandI
ndus
tryExper
ts
Pl
acementas
sis
tanc
e
1-
On-
1ment
ori
ngs
ess
ion
WhoShoul
dEnr
oli
nThi
sPr
ogr
am?
TheAdvancePenetr ati
on TestingPr ogram i
ses peci
all
yintended forc yber
securi
ty
prof
essi
onal
saspi
ri
ngt oelevat etheircareert
othee xecuti
velevel
.Learnerswhoha ve
complet
ed t
he Pentesting Program forSec uri
ty Engi
neersprogram by Dat aSpace
Academywil
lbeeli
gibletosignupf orthiscour
se.
Lea
rni
ng 7
Path
Herei
sst
ep-by-
steproadma ponthel
ear
ningpathofour
Adv
ancePenetra
tionTest
ingPr
ogramforPent
est
ing
Securi
tyEngi
neers
:
Ne
twor
king
Thec oursebeginswit
hanin-depthunderst
andingofcomput er
networ ki
ngfundamental
s,suchasTCP/IP,
subnetti
ng,routi
ng
protocols
,andnet wor
kdevices.I
fyoulear
nCCNA, itwil
lbemor e
conducivetolearnNPTforbetterfut
ureprospects
.
Oper
ati
ngSy
stems
Thenextst
epwill
helpyoutorefreshy ourknowledgeof
operat
ingsys
temssuchasWi ndows ,Linux,
andmac OS,
incl
udi
ngthei
rsecuri
tyfeaturesandvulnerabil
it
ies
.
Pene
tra
tionT
est
ingT
ool
s
Thethir
ds t
epwi l
lcov
eradvancedanal
ysisontheinf
rast
ruct
ure
andusageoft hemostcommonpenet r
ationtest
ingtool
ssuchas
Metasploi
t,Nmap,BurpSui
te,andWireshark.
Vul
ner
abi
l
it
yAs
ses
smen
t
I
nthisstep,wewi l
lconductvul
nerabi
li
tyasses
smentsus
ing
state-
of-the-
artpentesti
ngtoolst
oidenti
fyandcat
egori
se
vul
nerabil
it
iesandrankingthembasedonthei
rsever
ity.
Pene
tra
tionT
est
ingMe
thodol
ogi
es
Thisst
epwi l
ldel
vei nt
owi t
hthedif
fer
entpenetr
ati
ontes
tingmethodologi
es,
suchastheOpen- SourceSecuri
tyTest
ingMethodol
ogyManual (
OSSTMM) ,
Penetr
ationTest
ingEx ecuti
onStandar
d(PTES),
andInf
ormationSecur
ity
Assess
mentFr amewor k(ISAF)
.
Pene
tra
tionT
est
ingRepor
ti
ng
Apenetrati
ontesti
ngsessi
oni sneverc ompletewithoutacomprehensive
reporti
ngaboutthreatsdetected.Thus ,
thiss
tepismajorl
yaboutt he
know- howofcreati
ngadet ail
edr eportthatoutl
inesthevul
nerabil
it
ies
ident
ified,t
heirseverit
y,andr ecommendat i
onsforremediati
on.
Pene
tra
tionT
est
ingCer
tica
tions
:
Youwil
lear
nani
ndus
try-
rec
ogni
sedc
ert
ific
ateaf
tert
hec
ompl
eti
onof
thec
ourse.
Pr
ogr
amCurriculum 8
MAPT SOCus
ingSpl
unk
Mobil
e Penet
rati
on T
est
ing (
OWASP T
op 10, I
ntr
oduc
tionofSOC
Bur
pSuite,
Tools
…)
Whati
sEnt
erpr
isenet
wor
k
LabSet
upus
ingAndr
oidEmul
ator
Whati
sDef
ens
einDept
h
Vul
ner
abl
eappsandVM downl
oad
Whati
sLogPar
sing
Andr
oidAppl
ic
ati
onPent
est
ingbas
ics
DeepDi
vei
ntoSOCEnvi
ronment
Using Apk-t
ool
,
dex2jar
,J
D-GUIto dec
ompi
le
appsandrevi
ewthesourcec
ode Whatar
eSI
EM depl
oymentopt
ions
I
nter
cept
ingHTTPandHTTPSt
raf
fic SI
EM Ar
chi
tec
tur
e
I
nsec
ureDat
aSt
oragevul
ner
abi
li
ti
es Spl
unkI
ntr
oduc
tion
Ser
vers
ideandc
li
ents
idevul
ner
abi
li
ti
es Howt
oupl
oaddat
atos
plunk
I
nsec
urel
oggi
ng Whati
sSpl
unkFi
eld
Expor
tedAppl
ic
ati
onc
omponent
s Under
standi
ngwebl
ogs
Cl
ients
idei
njec
tion Howt
oCr
eat
eSpl
unkRepor
tsandDas
hboar
d
Andr
oidappl
ic
ati
ont
est
ingadvanc
ed Howt
oins
tal
lSpl
unkFor
war
deri
nwi
ndows
I
ntr
oduc
tiont
ofr
ida Whi
char
eimpot
entWi
ndowsEv
entCodes
Rootdet
ect
ionbypas
sus
ingObj
ect
ion Sc
enar
iosf
orSMTPPr
ofil
ing
I
nsec
urel
ocal
dat
ast
orage DNSPr
ofil
ing
Tr
afficanal
ysi
s HTTPt
raf
ficpr
ofil
ing
I
ntr
oduc
tiont
ofr
idaCLI Rol
esandRes
pons
ibi
li
ti
esasaSOCanal
yst
I
ntr
oduc
tiont
oSSLpi
nni
ng MCQAs
ses
sment-2
Bypas
singSSLpi
nni
ngus
ingFr
ida
MCQAs
ses
sment-1
Pr
ogr
amCurriculum 9
Adv
anceWebAt
tack
s WebSock
ets
XXE(
XMLExt
ernal
Ent
iti
es) Manipulat
ingWebSoc
ketmes
sagest
oexpl
oit
vul
nerabil
it
ies
Expl
oit
ingXXEus
inge
xter
nal
ent
iti
est
oret
riev
e
fil
es Manipulat
ingtheWebSoc
kethands
hak
eto
expl
oitvul
nerabi
li
ti
es
Expl
oit
ingXXEt
oper
for
mSSRFat
tac
ks
Cr
oss
-si
teWebSoc
kethi
jac
king
Bl
indXXEwi
thout
-of
-bandi
nter
act
ion
Bli
ndXXEwi t
hout-
of-
bandi
nter
act
ionvi
aXML
paramet
erenti
ti
es WebCa
chePoi
soni
ng
Expl
oit
ingbl
indXXEtoe
xfil
trat
edat
aus
inga
mali
ci
ousext
ernal
DTD Webc
achepoi
soni
ngwi
thanunk
eyedheader
Expl
oiti
ngbl
indXXEt
oret
riev
edat
avi
aer
ror Webc
achepoi
soni
ngwi
thanunk
eyedc
ooki
e
messages
Webc
achepoi
soni
ngwi
thmul
ti
pleheader
s
Expl
oit
ingXI
ncl
udet
oret
riev
efil
es
Target
ed web cac
he poi
soni
ng us
ing an
Expl
oit
ingXXEvi
aimagefil
eupl
oad unknownheader
Expl
oit
ingXXEt
oret
riev
edat
abyr
epur
pos
inga Webcachepoi
soni
ngvi
aanunk
eyedquer
y
l
ocalDTD par
amet
er
Par
amet
erc
loaki
ng
Ser
ver
-Si
deT
empl
ateI
nj
ect
ion Webc
achepoi
soni
ngvi
aaf
atGETr
eques
t
URLnor
mal
iz
ati
on
Bas
ics
erv
er-
sidet
empl
atei
njec
tion
Combi
ning web c
ache poi
soni
ng
Basi
cs er
ver
-si
de t
empl
ate i
njec
tion (
code
vul
ner
abil
it
ies
cont
ext
)
Cac
hek
eyi
njec
tion
Ser
v er
-si
de t empl
ate i
njec
tion us
ing
documentat
ion I
nter
nal
cac
hepoi
soni
ng
Ser
ver-s
idetempl
atei
nject
ioninanunknown
l
anguagewit
hadocumentedexpl
oit
Server
-si
det
emplat
ei nj
ecti
onwit
hinf
ormat
ion
dis
clos
urevi
aus
er-suppl
iedobj
ect
s
Serv
er-s
idetempl
atei
njec
tioni
nas
andbox
ed
envi
ronment
Serv
er-si
det
empl
atei
njec
tion wi
th ac
ust
om
expl
oit
MCQAs
ses
sment-3
Pr
ogr
amCurriculum 10
MAPT SOCus
ingSpl
unk
Mobil
e Penet
rati
on T
est
ing (
OWASP T
op 10, I
ntr
oduc
tionofSOC
Bur
pSuite,
Tools
…)
Whati
sEnt
erpr
isenet
wor
k
LabSet
upus
ingAndr
oidEmul
ator
Whati
sDef
ens
einDept
h
Vul
ner
abl
eappsandVM downl
oad
Whati
sLogPar
sing
Andr
oidAppl
ic
ati
onPent
est
ingbas
ics
DeepDi
vei
ntoSOCEnvi
ronment
Using Apk-t
ool
,
dex2jar
,J
D-GUIto dec
ompi
le
appsandrevi
ewthesourcec
ode Whatar
eSI
EM depl
oymentopt
ions
I
nter
cept
ingHTTPandHTTPSt
raf
fic SI
EM Ar
chi
tec
tur
e
I
nsec
ureDat
aSt
oragevul
ner
abi
li
ti
es Spl
unkI
ntr
oduc
tion
Ser
vers
ideandc
li
ents
idevul
ner
abi
li
ti
es Howt
oupl
oaddat
atos
plunk
I
nsec
urel
oggi
ng Whati
sSpl
unkFi
eld
Expor
tedAppl
ic
ati
onc
omponent
s Under
standi
ngwebl
ogs
Cl
ients
idei
njec
tion Howt
oCr
eat
eSpl
unkRepor
tsandDas
hboar
d
Andr
oidappl
ic
ati
ont
est
ingadvanc
ed Howt
oins
tal
lSpl
unkFor
war
deri
nwi
ndows
I
ntr
oduc
tiont
ofr
ida Whi
char
eimpot
entWi
ndowsEv
entCodes
Rootdet
ect
ionbypas
sus
ingObj
ect
ion Sc
enar
iosf
orSMTPPr
ofil
ing
I
nsec
urel
ocal
dat
ast
orage DNSPr
ofil
ing
Tr
afficanal
ysi
s HTTPt
raf
ficpr
ofil
ing
I
ntr
oduc
tiont
ofr
idaCLI Rol
esandRes
pons
ibi
li
ti
esasaSOCanal
yst
I
ntr
oduc
tiont
oSSLpi
nni
ng MCQAs
ses
sment-2
Bypas
singSSLpi
nni
ngus
ingFr
ida
MCQAs
ses
sment-1 Adv
anceWebAt
tack
s
Pr
ogr
amCurriculum 11
I
nsecur
eDes
eri
al
iz
ati
on RedT
eami
ng
Modi
fyi
ngs
eri
ali
zedobj
ect
s I
ntr
oduct
ion to r
ed t
eam c
onc
ept
s and
met
hodol
ogies
Modi
fyi
ngs
eri
ali
zeddat
atypes
Cyberki
ll
chai
n
Usi
ng appl
icati
on f unc
tional
it
y t
o e
xpl
oit
i
nsecur
edes
er i
ali
zat
ion I
nit
ialv
ector
sofc
ompr
omi
se(
Mit
reATT&CK
f
ramework)
Ar
bit
rar
yobj
ecti
njec
tioni
nPHP
C2f
ramewor
k(Cov
enantandempi
re)
Expl
oit
ing J
ava des
eri
ali
zat
ion wi
th Apac
he
Commons Cobal
tSt
rik
e
Exploi
ti
ngPHPdes
eri
ali
zat
ionwi
thapr
e-bui
lt Rel
evant Red team t ools (Bl
oodhound,
gadgetchai
n Mimikat
z,I
mpac
ket,Powerspl
oit
)
Exploi
ti
ng Ruby des eri
ali
zat
ion us
ing a I
nter
medi
atewi
ndowsandl
inuxc
ommands
documentedgadgetc
hai
n
Pr
oces
sInj
ect
ion
Devel
opi
ng a cus
tom gadgetc
hai
nforJ
ava
des
eri
ali
zat
ion Lat
eral
Mov
ement
Devel
opi
ng a cus
tom gadgetc
hai
nforPHP Por
tFor
war
ding
des
eri
ali
zat
ion Adv
ers
aryEmul
ati
on(
APT3)
UsingPHARdes
eri
ali
zat
iont
odepl
oyac
ust
om MCQAs
ses
sment-5
gadgetc
hai
n
JWTExpl
oi
tat
ion API
Pen
tes
ti
ng
J
WT aut hent
icat
ion bypas
s vi
a unv
eri
fied
HowwebAPIwor
ks
s
ignat
ure
J
WTauthenti
cat
ionbypas
svi
afla
weds
ignat
ure Thr
eatModel
inganAPIT
est
v
eri
ficat
ion THEANATOMYOFWEBAPI
S
J
WTaut
hent
icat
ionbypas
svi
aweaks
igni
ngk
ey
RESTAPISpec
ific
ati
ons
J
WT aut hent
icat
ion bypas
s vi
ajwk header
i
njec
tion APIAut
hent
icat
ion
J
WT aut hent
icat
ion bypas
s vi
ajku header
i
njec
tion
J
WTaut hent
icat
ionbypas
svi
aki
dheaderpat
h
t
rav
ers
al
J
WT authent
icat
ion bypas
s vi
a al
gor
ithm
c
onf
usi
on
J
WT authenti
cat
ion bypas
s vi
a al
gor
ithm
c
onf
usi
onwithnoexpos
edkey
MCQAs
ses
sment-4
Pr
ogr
amCurriculum 12
CommonAPI
Vul
ner
abi
l
it
ies Cl
oudPen
tes
ti
ng
I
nfor
mat
ionDi
scl
osur
e Ar
chi
tec
tur
e,Di
scov
ery
,andRec
onatSc
ale
Br
okenObj
ectL
evel
Aut
hor
izat
ion At
tac
kingI
dent
itySys
tems
Br
okenUs
erAut
hent
icat
ion At
tac
kingandAbus
ingCl
oudSer
vic
es
Ex
ces
siv
eDat
aExpos
ure Vul
ner
abi
li
ti
esi
nCl
oud-
Nat
iveAppl
ic
ati
ons
Lac
kofRes
our
cesandRat
eLi
mit
ing I
nfr
ast
ruc
tur
eAt
tac
ksandRedT
eami
ng
Br
okenFunc
tionL
evel
Aut
hor
izat
ion MCQAs
ses
sment-7
Mas
sAs
signment
Sec
uri
tyMi
sconfigur
ati
ons
I
njec
tions
I
mpr
operAs
set
sManagement
Bus
ines
sLogi
cVul
ner
abi
li
ti
es
Pas
siv
eRec
on
Ac
tiv
eRec
on
Endpoi
ntAnal
ysi
s
FUZZI
NG
Automat
ingMassAss
ignmentAt
tac
kswi
th
Arj
unandBurpSui
teIntr
uder
At
tac
kingGr
aphQL
MCQAs
ses
sment-6
14
T
ool
sCo
ver
ed
Ski
l
lsCo
ver
ed
Advanceds
canni
ng At
tac
kingf
romt
he Cli
ent-
sidepen-
methods Web tes
ting
Att
acki
ngf
romt
he Breaki
ngoutof Bypassi
ng
LAN rest
ric
tedenvi
ronment
s network-
bas
ed
IDS/I
PS
Pr
ivi
legees
cal
ati
on Pos
t-e
xpl
oit
ati
on
13
Ca
reerTr
ans
iti
ons
Thedomai
nofpenet
rat
iont
est
inge
xtendsoppor
tuni
ti
esf
orpr
ofes
sional
sfr
om
mult
ipl
efiel
ds:
Net
wor
k&Sys
temAdmi
nis
trat
ors
WebDev
eloper
s
Sof
twar
eDev
eloper
s
Sof
twar
eAr
chi
tec
ts
Dat
abas
eAdmi
nis
trat
ors
CareerOpport
uni
ti
esAft
erAdv
ance 15
Penetra
tionT
esti
ngPr
ogram
OurAdvanc ePenet rati
onT esti
ngPr ogram opensupmul t
ipl
ec areeropportunit i
esfor
pentester
sandc ybersecur
ityprofessi
onals.Aftercomplet
ingthecour s
e,youwi llbeable
toapplyforanumberofr elat
edj obroles,suchasNet workDef ender,Ethi
c alHac k
er,
Infor
mat i
on Security Manager ,and mor e.Dev el
oped by wel l-
respect
ed i ndustry
practi
ti
oners,t
hisc ours
eens uresy oureceivethemos timportantlearni
nge xper i
ences
andskill
sneededt olandupwi t
has ucc
essfulcareeri
nthePent est
ingandCyber secur
ity
domain.
Herei
sabr i
efonthedi
ff
erentcar
eeropportuni
ti
esy
ouwi
llbeabl
etoa
vai
laf
ter
compl
eti
ngt
heAdvanc
ePenetr
ati
ontes
tingPr
ogram:
1 Cer
tiedNet
wor
kDef
ender 2 Network / Cl
oud Secur
ity
Engi
neer
ACert
ifiedNet
workDef
enderi
nIndi
acan Anyonest
arti
ngasaNet
work/Cl
oudSec
uri
ty
ear
nupto₹23.8LPA. Engi
neercanear
nupto₹ 5LPA.
24.
3 Cer
tiedEt
hicalHacker 4 I
TAudi
tor
s
Thea ver
agesal
aryofanemployeeasa AnI
TAudi
tor
scanear o₹1
nupt 8.
6LPA
Cer
tifiedEthi
cal
Hackerf
etc
hcl
oseto
₹
19.
3LPA.
5 I
nfor
mat
ionSecur
ityManager 6 I
TPr
ojectManager
The s
alar
y of an I
nfor
mat
ion Sec
uri
ty AI
T Pr
ojec
tManagerc
oul
d ear
ncl
oset
o
Managerc o₹
angoupt 38.
4LPA. ₹15.
3LPA
16
Mee
t-Ups-Wor
kshops
AtDat aspaceAc ademy,webelievelear
ningdoes n'tendint hecl
assroom.Weof fera
varietyofwor kshopsandmeet -upstoprovides t
udent swit
hhands -
one xperi
enceand
practicalski
ll
sthattheycanuseinthei
rcareers.DataspaceAcademyhashos tedmulti
ple
wor kshopsandt echni
caltr
aini
ngac ros
smaj orcoll
eges.Thesecampsuni telear
ner s
,
faculty,and industryexpert
sf orapower -packed dayofac ti
vit
ies,career-
bui
lding
sessions,andliv
egr oupproj
ects
.
Attheendoftheworkshops,st
udent
sr ec
eiv
ec ert
ific
atesofattendance.I
ndust
ry
part
ner
srec
ogni
zeourc
erti
ficati
ons,
andtheyprovi
deavaluabl
eaddi
tiontoast
udent'
s
res
ume.
Her
est
udent
sandf
acul
tynet
wor
kandi
nter
actwi
tht
hes
kil
lst
ocr
eat
eapos
iti
vei
mpac
t.
17
Hea
rfr
omOurLea
rner
s
Icanhones tl
ysayt hatjoini
ng
TheAdvanc ePent est
ingcourse Dat aspaceAc ademywasoneof
atDat aspac eAc ademyi snot themos tchall
engingand
fort hef aintofhear t.
It'
sa rewar dingexperienc esofmy
rigorousandc hall
enging li
fe.Thei nstr
uctor sarebr i
ll
iant
pr ogramt hatwillpushy outo andt heAdvanc ePent esti
ng
yourl imi ts.
Buti fyou'reupfor cour s
ec ontentisc utti
ng-edge.
thec hal l
enge, you'll
comeout Ifyou'res er
iousaboutac areer
theot hers i
dewi thawhol enew incyber securi
ty,thisisthe
setofs kil
lsandanewf ound cour s
ef oryou.
res pectf orthewor l
dof
cyber sec urit
y.
-
Pri
yaShar
ma,
-
Rohi
tSi
ngh,
Pa
tna
Amri
tsar
Theadvancepentes
tingc ours
eatDatas paceAcademyisnoty ouraverage
cyber
securit
ycours
e.It'sadeepdiveintotheworldofreal-
wor l
dhac ki
ng,
withafocusonthemos tadvancedtechniquesandtools
.Ifyou'r
elookingfor
achal
lengeandwantt ot ak
eyourskil
lstothenextlevel
,thi
sisthecoursefor
you.
-
Raj
eevMenon,
Kol
l
ar
18
OurCommi
tmen
t
Cl
assr
oom As
signment DoubtClear
ing
Ses
sion Projec
t Sessi
ons
Exam GetCer
tific
ati
on Li
vePr
ojec
ts
I
nter
nshi
p
Opport
uni
ty
Pr
ogr
amDe
tai
l
s
Dur
ati
on El
i
gibi
l
ityCr
it
eri
a
6Mon
ths Someonewi
thexperi
enceintheITDomai
nwi
th
asecuri
tyf
ocus(Pene
tra
tionTes
ti
ngPr
ogr
amf
or
Secur
it
yEng
ineer
srecommended)
Pr
ogr
amF
ormat Pr
ogr
amF
ee
Onl
i
ne-
Oli
ne ₹3
5,000/
-
(
Bot
hAv
ail
abl
e) (
+18
%GS
T)
19
Con
tac
tUs
Phone: Ema
il
:
+919800323096 i
nfo@dat
aspac
esec
uri
ty.
com
Webs
it
e:
www.
dat
aspac
eac
ademy
.com
OurBr
anches
Kol
kat
a: KS
A
GlobsynCrystal
s,T
ower -
1,5thFloor
, El
ectroni
cNetworks&Syst
ems
EPBl oc
k,Sal
tLakeElect
ronic
sCompl ex, (
C.R.2051040425),
Al-
Khobar
,
SectorV,Bi
dhannagar,
Kolkata, EP,
KSA
Wes tBengal700091
Dur
gapur Dha
nba
d
Shai
dBhagatSinghSt
adi
um, Si
si
r Cit
yCenter
,2ndfloor,OfficeNu.-
401,
MansionDCCinema,Durgapur, Bart
and,
Dhanbad,Jharkhand826001
WestBengal700016
TH A N K YO U