Current Status
Not Enrolled
Price
COMING SOON
Get Started
This integral bytes course is currently closed
Batch Duration | Two Weeks with 2 Weekend Sessions |
Start Date | To Be Announced |
Online Access to Session Recording | 100 Days |
Self Study Content Access | 1 Year |
Study Methodology | Online Self Study, Live Sessions, Practical Assignments (To be explained during 1st session) |
Key Requirements | 2 Hours Self Study Daily over the course Personal Laptop with 8 GB RAM Good Internet Connection at Home |
After Succesful Completion | IBSA Certificate |
In web application assessment, the target may be either accessible or not within direct reach. The methodology to know more about target differs based upon the kind of access we have to the target.
In this batch, you’ll get to know about how information is gathered for an unknown target and how vulnerability assessment is conducted when the target is known and allowed direct access. The syllabus includes –
- Passive Information gathering tools and processes
- Active Information gathering tools and processes
- Vulnerability Assessment using NESSUS & NMAP