Current Status
Not Enrolled
Price
COMING SOON
Get Started
This integral bytes course is currently closed
Batch Duration Two Weeks with 2 Weekend Sessions
Start DateTo Be Announced
Online Access to Session Recording100 Days
Self Study Content Access1 Year
Study MethodologyOnline Self Study, Live Sessions,
Practical Assignments
(To be explained during 1st session)
Key Requirements2 Hours Self Study Daily over the course
Personal Laptop with 8 GB RAM
Good Internet Connection at Home
After Succesful CompletionIBSA Certificate

In web application assessment, the target may be either accessible or not within direct reach. The methodology to know more about target differs based upon the kind of access we have to the target.

In this batch, you’ll get to know about how information is gathered for an unknown target and how vulnerability assessment is conducted when the target is known and allowed direct access. The syllabus includes –

  • Passive Information gathering tools and processes
  • Active Information gathering tools and processes
  • Vulnerability Assessment using NESSUS & NMAP

About the Instructors

25+ Years Business and Operations experience into IT, Cyber Security & Business Development.