Information Sharing and Analysis Center

Information Sharing and Analysis Center

An international non-profit, solving large problems impacting the connected, digital world on cyber security.

NSD Empaneled ISAC Certified

Penetration Tester (ICPT)


NSD Empaneled ICPT certification is a recognized 72 hours (8 live sessions) Instructor-led program for information security professionals with hands-on proven experience in vulnerability assessment and penetration testing. 

Emplaned under FutureSkillsPrime
Program available on GeM.

Unlock Lifetime Access to ISAC Certifications with Complimentary Training and Free of cost Online Internship: pay only for certification and lab costs.​

Hours of Live Sessions
0 +
Hours of Online Virtual Labs
0 +
Hours of Reading Material
0 +
Learn everything to get started in cybersecurity as a pen Tester

The program is a foundation for many other job roles including SOC, Threat Management, Computer Forensics, Web Application Security, ISO 27001 Compliance, PCI-DSS, Internal IT Security Audit etc. 

Program Outline

  • Introduction
    • Introduction to Ethical Hacking
    • Types of Hackers and their motives
    • Some Basic Terminologies 
    • CIA Triad

  •  Networking Basics
    • OSI Model
    • TCP/IP Protocol Stack
    • Protocol and their related Services 
    • IP Address, MAC Address, Port Address
    • Subnetting and Routing
    • Wireshark – Packet Sniffing and Analysis

  • Software Installation and Experimental Setup
    • About Linux/Unix Operating System
    • Setting-up your Hacking environment
    • Honeypots

Linux Basics

  • Linux File Structure
  • Basic Linux Commands
  • TCPDump, Tshark, Netcat etc. (Network Analysis)
  • Basics of Vulnerability Scanning using Nmap & related Scripts
  • MAC Changer

  • Linux Booting Process
    • Linux Run Levels
    • Linux Permissions
    • Basics of Bash Scripting

  • Cryptography and Steganography
    • Symmetric Encryption / Private Key Cryptography
    • Asymmetric Encryption / Public Key Cryptography
    • Cryptographic Hash Functions and Values
    • Encoding Decoding
    • Steganography and different types
    • Steghide, stegseek etc.
  • Passive Reconnaissance
    • Netcraft
    • nslookup
    • Google Dorking
    • Shodan 
    • Censys
    • The Harvester
    • Whois Enumeration and Reverse Whois
    • DNS Enumeration

  • Active Reconnaissance and Connection Establishment
    • Traceroute
    • Netcat
    • Nmap
    • Metasploit (overview)
    • FTP Connection and Remote File Uploading/download
    • SSH Connection
    • Telnet Connection

  • Vulnerability Scanning
    • Advanced Vulnerability Scanning using NMAP
    • OpenVAS/Nessus
  • Password Cracking

    • Wordlists
    • Creating Custom Wordlists using Crunch
    • Hydra for Password Cracking
    • John the Ripper
    • Metasploit for SSH password cracking
    • Cyber Chef
    • Rainbow Tables
    • Basic Authentication Attacks

  • Malwares, Trojans, Virus and Worm
    • Different Types of Malwares and Viruses
    • Different Types of Bombs
    • Dos and DDoS Attacks

  • Darkweb
    • TOR
    • Onion Websites
  • Metasploit
    • Introduction to Metasploit 
    • Creating payloads using Metasploit
    • Reverse Listeners
    • Exploiting Windows System
    • Working with Burp Suite
    • HTTP Request and Methods
    • Status Codes
    • CVSS
  • Introduction to Web Pentesting
    • Reflected XSS
    • Stored XSS
    • DOM XSS
    • Javascript Validation
    • SQL Injection
    • Command Injection
    • OWASP Top 10
    • 2013 v/s 2017 v/s 2021
    • Bruteforcing
    • Content Security Policy
    • Security Headers
  • Subdomain Enumeration
    • Waybackurls
    • Tips & Tricks 
    • CTF Solving Approach
    • Pentest Reports

Program Outcome

Gain a solid understanding of the basic concepts in information and cyber security, building a strong foundation for advanced topics.

Experience a practical approach to cybersecurity, with hands-on Cyberange virtual labs to reinforce theoretical knowledge.

Learn about industry-level cyber operations, relevant laws, policies, and frameworks to stay compliant and effective.

Develop the skills needed to identify and respond swiftly to security incidents, a critical ability in today’s threat landscape.

Prepare for entry-level roles like Security Analyst or Junior Engineer, equipped with essential skills to start your career in Security Operations.

Upcoming Batches

December Batch

4.00PM - 7.00PM

14th – 15th Dec 2024

21st – 22nd Dec 2024

28th – 29th Dec 2024 

04th Jan 2025

Exam
  • Written Test – Jan 11th 2024 5 PM – 7 PM
  • Lab Test – Jan 11th 10 PM to Jan 12th 10 PM

With over 20,00,000 jobs available in India alone, it is increasingly becoming difficult for companies to find good cybersecurity professionals. Organizations no longer want to trust professionals who become “ethical hackers” by simply passing an online objective-based exam, as they seldom have the real-world perspective and confidence to execute the job once given. Professionals with incomplete knowledge are not only putting their organization at risk, but also their Nation, as they handle sensitive projects impacting the economy of the country.

The National Security Database is the only not-for-profit program, well recognized and respected by various Corporate and Government organizations for its stringent process and hands-on lab exams for assessing the credibility of a professional.

A skilling ecosystem focused on emerging technologies, powered by a partnership between the Ministry of Electronics and Information Technology, Government of India, NASSCOM, and the IT industry. It seeks to propel India to become a global hub of talent in emerging technologies.

Benefits of FutureSkills Prime:
  • Participation and Course Completion Certificate
  • Incentives from the Government of India. Get part fee refund.
  • Access to Career Fairs, Hackathons, Internships, Skill Challenges, etc
  • Flexibility to pick from the variance of courses aligned to NSQF (National Skills Qualifications Framework)
  • Opportunities to apply for roles like security analyst, cloud architect, and IoT network specialist.

The course is best suited for:

  • Network Admins
  • Students and Professionals keen to get started in Cybersecurity
  • Programmers keen to learn secure coding
  • Law Enforcement Agencies
  • Armed Forces Personnel
  • Preferably should have undergone CCIO + CPEW & ICBIS

What You Get

Live instructor led sessions
The live interactive sessions are conducted by the industry experts
Access to e-learning videos

Get 60 days access to course videos on the ISAC e-learning portal, updated regularly!

Access to Cyberange Virtual Labs

60 Day access to Cyberange Virtual Labs (ID/Password will be sent via email)

ISAC Certified Penetration Tester Certification

Eligible to be empaneled in National Security Database
 

Get listed in the National Security Database program by completing the of Penetration Testing certification. Professionals from NSD contribute effectively to their organization’s cybersecurity defenses, identifying vulnerabilities and ensuring a safer digital environment for all.

Complimentary attempts to pass

The Examination includes two free attempts, allowing candidates a second chance to improve their scores or deepen their understanding without additional costs. This benefit supports candidates in achieving certification with confidence and flexibility.

Complimentary access to the ISAC Members ICBIS community

Enjoy complimentary access to the exclusive ISAC Members ICBIS community, connecting you with industry experts and peers. Engage in valuable discussions, share insights, and stay updated on the latest in Cyber Security.

PROGRAM

Features & Benefits

ISAC Community

Get access to the exclusive ISAC Community. Enhance your profile credibility globally. 

Know More

60 Days Access to Cyberange Virtual Labs

Help the victims of cybercrimes. Be a part of a global community and Get Recognition.

Know More

Hands- On with Cyberange Virtual Labs

Get 60 Days access to Cyberange Virtual Labs for hands-on practice:
  • Penetration Testing Labs
  • Social Engineering Labs
  • Malware Labs
  • Cyber Forensic Labs
  • Password Cracking Labs
  • Bug Bounty Labs
Learn cyber security basics practically with your Instructor with our cloud labs!