Program Overview
This intensive program in penetration testing training equips you with end-to-end offensive security skills, from lab setup (Kali Linux, Metasploitable) to advanced exploitation. Master Linux, networking, and OSINT for footprinting, then dive into Nmap scanning, web app hacking (OWASP Top 10), and wireless attacks (WPA/WPA2 cracking). Learn system exploitation (privilege escalation, malware) and MITM techniques (ARP spoofing, SSL stripping). Finally, automate attacks using Python scripting (keyloggers, brute force tools) for real-world red teaming—all through hands-on labs in a safe, virtualized environment.
Program Objectives
Labsetup
Set up a penetration testing lab and understand Linux commands.
Gathering Information
Conduct passive and active information gathering.
Testing
Perform web app pen testing and exploit vulnerabilities.
Wireless Hacking
Crack Wi-Fi passwords and sniff network traffic.
Learning Outcomes
Key Highlights
End-to-End Pentesting Training – From lab setup to advanced exploitation techniques.
Hands-On Labs – Practice in a safe, virtualized environment (Kali Linux, Metasploitable).
Linux & Networking Mastery – Command-line tools, scripting, and protocol analysis (TCP/IP, Wireshark).
OSINT & Footprinting – Gather intelligence using WHOIS, DNS, and social engineering.
Nmap & Port Scanning – Detect open ports, services, and vulnerabilities.
Web App Security – Exploit OWASP Top 10 flaws (SQLi, XSS, CSRF).
Wireless Hacking – Crack WPA/WPA2, rogue AP attacks, and encryption bypass.
System Exploitation – Privilege escalation, password cracking, and malware deployment.
MITM Attacks – ARP spoofing, SSL stripping, and traffic interception.
Python Automation – Build offensive tools (keyloggers, brute force scripts) for red teaming.
Instructor
Mr. Ponsuresh Manoharan
Subject Matter Expert – Cybersecurity – L&T EduTech
Ponsuresh Manoharan is a seasoned Subject Matter Expert in Cyber Security with over 16 years of experience in IT training, curriculum development, and academic leadership. Currently associated with Larsen & Toubro EduTech, he specializes in designing customized training programs and delivering engaging computer courses for employees and students. His expertise spans ethical hacking, core Java, and application development, complemented by a strong background in research and international conferences.
With a Ph.D. in Computer Science and Engineering (pursuing) and an MTech in Information Technology, Ponsuresh has held academic roles at institutions like Kalasalingam Academy of Research and Education and Jigjiga University, Ethiopia. His contributions include securing research grants, publishing in reputed journals, and mentoring students. Known for his personable approach and commitment to inclusive education, he excels in creating dynamic learning environments that bridge industry and academia.
Mr. Sabari Giri Murugan S
Subject Matter Expert - Cybersecurity & Program Manager – L&T EduTech
Sabari Giri Murugan is a seasoned Cybersecurity Subject Matter Expert with 12+ years of experience in technology research, security frameworks, and program management. At L&T EduTech, he designs industry-aligned curricula for cybersecurity, AI, and emerging technologies while serving as the Single Point of Contact (SPOC) for cross-functional teams. His expertise spans vulnerability assessment, network security (CompTIA Security+ certified), and incident response, with hands-on proficiency in tools like Nmap, Nessus, and Cisco Packet Tracer. Sabari has successfully managed end-to-end training programs for corporate and academic learners, ensuring alignment with global standards like NSE and Microsoft Azure.
An accomplished researcher with 2 Scopus-indexed publications and 6 international journal papers, Sabari is also a sought-after keynote speaker, having hosted webinars on phishing attacks, OS exploitation, and IoT security for institutions like SNS College of Technology and Sathyabama University. His dual strengths in content development (MS Office, LMS tools) and technical instruction (CEH, network defense) enable him to bridge theoretical knowledge with real-world security challenges.