{"id":1100,"date":"2023-10-21T20:02:20","date_gmt":"2023-10-21T20:02:20","guid":{"rendered":"https:\/\/cyberwing.pk\/trainings\/?page_id=1100"},"modified":"2024-06-24T18:52:40","modified_gmt":"2024-06-24T13:52:40","slug":"penetration-testing-in-lahore","status":"publish","type":"page","link":"https:\/\/cyberwing.pk\/trainings\/penetration-testing-in-lahore\/","title":{"rendered":"Penetration Testing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1100\" class=\"elementor elementor-1100\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-7a3211bf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7a3211bf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3aa702b0\" data-id=\"3aa702b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-47c63b7a elementor-widget elementor-widget-heading\" data-id=\"47c63b7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Penetration Testing Course in Lahore<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27f61c59 elementor-widget elementor-widget-text-editor\" data-id=\"27f61c59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Welcome to Cyberwing Trainings, Our Penetration Testing Course in Lahore, where you&#8217;ll embark on a journey to become a skilled ethical hacker and cybersecurity expert. This course is designed to equip you with the knowledge and hands-on skills needed to identify and address vulnerabilities in computer systems, networks, and applications. Whether you&#8217;re an aspiring cybersecurity professional or simply interested in the art of ethical hacking, this course offers an in-depth exploration of the world of penetration testing.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-14b29e65\" data-id=\"14b29e65\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61b49ac elementor-widget elementor-widget-image\" data-id=\"61b49ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"571\" src=\"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/penetration-testing.jpg\" class=\"attachment-large size-large wp-image-1225\" alt=\"\" srcset=\"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/penetration-testing.jpg 840w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/penetration-testing-300x214.jpg 300w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/penetration-testing-768x549.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-1cadd6d2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1cadd6d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-374df99\" data-id=\"374df99\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-58fbc736 elementor-widget elementor-widget-spacer\" data-id=\"58fbc736\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4973a1e8 elementor-widget elementor-widget-heading\" data-id=\"4973a1e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Upcoming Batch Details\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-3ea56bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3ea56bcf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-5a0d0c95\" data-id=\"5a0d0c95\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27a14507 eael-dt-th-align-center eael-table-align-center elementor-widget elementor-widget-eael-data-table\" data-id=\"27a14507\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-data-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"eael-data-table-wrap\" data-table_id=\"27a14507\" id=\"eael-data-table-wrapper-27a14507\" data-custom_responsive=\"false\">\n\t\t\t<table class=\"tablesorter eael-data-table center\" id=\"eael-data-table-27a14507\">\n\t\t\t    <thead>\n\t\t\t        <tr class=\"table-header\">\n\t\t\t\t\t\t\t\t\t            <th class=\" sorting\" id=\"\" colspan=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"data-table-header-text\">Course Name<\/span><\/th>\n\t\t\t        \t\t\t\t            <th class=\" sorting\" id=\"\" colspan=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"data-table-header-text\">Mode of Training\t<\/span><\/th>\n\t\t\t        \t\t\t\t            <th class=\" sorting\" id=\"\" colspan=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"data-table-header-text\">Trainer<\/span><\/th>\n\t\t\t        \t\t\t\t            <th class=\" sorting\" id=\"\" colspan=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"data-table-header-text\">Starting Date<\/span><\/th>\n\t\t\t        \t\t\t\t            <th class=\" sorting\" id=\"\" colspan=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"data-table-header-text\">Timing<\/span><\/th>\n\t\t\t        \t\t\t\t            <th class=\" sorting\" id=\"\" colspan=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"data-table-header-text\">Days<\/span><\/th>\n\t\t\t        \t\t\t\t        <\/tr>\n\t\t\t    <\/thead>\n\t\t\t  \t<tbody>\n\t\t\t\t\t\t\t\t\t\t\t<tr>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p>CCNA<\/p>\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tPhysical\/Online\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tSir Fiaz Ahmad\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t28 July 2025\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t07:30 &#8211; 09:00\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t   \t\t\t\t\t\t\t\t\t\t\t<td colspan=\"\" rowspan=\"\" class=\"\" id=\"\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"td-content-wrapper\"><div class=\"td-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\tMonday\/Wednesday\/Friday\t\t\t\t\t\t\t\t\t\t\t\t<\/div><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/td>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/tr>\n\t\t\t        \t\t\t    <\/tbody>\n\t\t\t<\/table>\n\t\t<\/div>\n\t  \t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-55746c76\" data-id=\"55746c76\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-56ad1e76 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"56ad1e76\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1965847a\" data-id=\"1965847a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-48637d60 elementor-widget elementor-widget-heading\" data-id=\"48637d60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Course Fees<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-580e6637 elementor-widget elementor-widget-heading\" data-id=\"580e6637\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">PKR 20,000\/-<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-4a73b5fe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4a73b5fe\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-71cecebc\" data-id=\"71cecebc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3329611e elementor-widget elementor-widget-spacer\" data-id=\"3329611e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-7db97f71 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7db97f71\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-44a92170\" data-id=\"44a92170\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6af5a671 elementor-widget elementor-widget-heading\" data-id=\"6af5a671\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What is penetration testing?\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-206beeab elementor-widget elementor-widget-text-editor\" data-id=\"206beeab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A penetration test, also known as a pen test, is a simulated cyberattack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF).\u00a0<\/p><p>Pen testing can involve the attempted breaching of any number of application systems, (e.g., application protocol interfaces (APIs), frontend\/backend servers) to uncover vulnerabilities, such as unsanitized inputs that are susceptible to code injection attacks.<\/p><p>Insights provided by the penetration test can be used to fine-tune your WAF security policies and patch detected vulnerabilities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd9e978 elementor-widget elementor-widget-heading\" data-id=\"bd9e978\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Who this course is for:\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2668510 elementor-widget elementor-widget-text-editor\" data-id=\"2668510\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li>University students studying computer science or a related field<\/li><li>Tinkerers wanting to ensure their apps are secure<\/li><li>Employees wanting to improve the cyber security of their firm<\/li><li>Developers interested in learning security<\/li><li>Security professionals wanting to refresh their knowledge<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b65ee4a elementor-hidden-tablet elementor-hidden-mobile\" data-id=\"b65ee4a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2d2ad56a elementor-widget elementor-widget-heading\" data-id=\"2d2ad56a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Like &amp; Follow<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d89e76 elementor-widget elementor-widget-facebook-page\" data-id=\"6d89e76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"facebook-page.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-facebook-widget fb-page\" data-href=\"https:\/\/www.facebook.com\/cyberwing.pak\" data-tabs=\"timeline\" data-height=\"400px\" data-width=\"500px\" data-small-header=\"false\" data-hide-cover=\"false\" data-show-facepile=\"false\" data-hide-cta=\"false\" style=\"min-height: 1px;height:400px\"><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-56eb0f51 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"56eb0f51\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1db0675a\" data-id=\"1db0675a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6a21df6b elementor-widget elementor-widget-heading\" data-id=\"6a21df6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Why Learn Penetration Testing with Cyberwing?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-374a5ae2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"374a5ae2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-3da9c5e7\" data-id=\"3da9c5e7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-46d869c7 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"46d869c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/1.png\" class=\"attachment-full size-full wp-image-380\" alt=\"\" srcset=\"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/1.png 512w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/1-300x300.png 300w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/1-150x150.png 150w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/1-100x100.png 100w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Industry-Recognized Certification<\/h3><p class=\"elementor-image-box-description\">Gain a certification that is widely respected in the cybersecurity industry, boosting your credibility and employability.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-299cae5c\" data-id=\"299cae5c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-301c825 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"301c825\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/2.png\" class=\"attachment-full size-full wp-image-381\" alt=\"\" srcset=\"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/2.png 512w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/2-300x300.png 300w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/2-150x150.png 150w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/2-100x100.png 100w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Hands-On Learning<\/h3><p class=\"elementor-image-box-description\">Immerse yourself in practical, real-world scenarios through hands-on labs, ensuring you master the art of ethical hacking.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5f09a33b\" data-id=\"5f09a33b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ff9a71c elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"7ff9a71c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/3.png\" class=\"attachment-full size-full wp-image-382\" alt=\"\" srcset=\"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/3.png 512w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/3-300x300.png 300w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/3-150x150.png 150w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/3-100x100.png 100w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Expert Instructors<\/h3><p class=\"elementor-image-box-description\">Learn from seasoned experts and industry professionals who bring real-world insights and guidance to your training.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-200e86a3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"200e86a3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-41a606db\" data-id=\"41a606db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-152ed64d elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"152ed64d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/4.png\" class=\"attachment-full size-full wp-image-383\" alt=\"\" srcset=\"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/4.png 512w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/4-300x300.png 300w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/4-150x150.png 150w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/4-100x100.png 100w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Comprehensive Curriculum<\/h3><p class=\"elementor-image-box-description\">Explore a holistic curriculum that covers every facet of penetration testing, equipping you with in-depth knowledge and skills.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-209b3e6f\" data-id=\"209b3e6f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f7e5d30 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"5f7e5d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/5.png\" class=\"attachment-full size-full wp-image-384\" alt=\"\" srcset=\"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/5.png 512w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/5-300x300.png 300w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/5-150x150.png 150w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/5-100x100.png 100w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Career Opportunities<\/h3><p class=\"elementor-image-box-description\">Unlock a world of career opportunities in the ever-growing field of cybersecurity, where your expertise is in high demand.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-77f40d7c\" data-id=\"77f40d7c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-62cdfc72 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"62cdfc72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/6.png\" class=\"attachment-full size-full wp-image-385\" alt=\"\" srcset=\"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/6.png 512w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/6-300x300.png 300w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/6-150x150.png 150w, https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/6-100x100.png 100w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Support and Community<\/h3><p class=\"elementor-image-box-description\">Access a supportive learning environment and connect with peers and mentors who nurture your growth and success in the cybersecurity community.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-562459a8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"562459a8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3764b897\" data-id=\"3764b897\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c5340ad elementor-widget elementor-widget-heading\" data-id=\"1c5340ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Penetration Testing Course Outline<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-203afae9 elementor-widget elementor-widget-menu-anchor\" data-id=\"203afae9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"courseoutline\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-771b4d5d elementor-widget elementor-widget-toggle\" data-id=\"771b4d5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1991\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1991\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-angle-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">1: Introduction to Penetration Testing<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1991\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1991\"><ul><li>Understanding Ethical Hacking<\/li><li>The Importance of Penetration Testing<\/li><li>Legal and Ethical Aspects<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1992\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1992\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-angle-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">2: Information Gathering and Reconnaissance<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1992\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1992\"><ul><li>Footprinting and Fingerprinting<\/li><li>Scanning and Enumeration<\/li><li>Identifying Vulnerabilities<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1993\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1993\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-angle-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">3: Vulnerability Assessment<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1993\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1993\"><ul><li>Identifying System and Network Vulnerabilities<\/li><li>Analyzing and Ranking Vulnerabilities<\/li><li>Exploiting Vulnerabilities Safely<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1994\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1994\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-angle-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\"> 4: Exploitation Techniques<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1994\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1994\"><ul><li>Password Cracking and Bypassing<\/li><li>Gaining Unauthorized Access<\/li><li>Privilege Escalation<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1995\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1995\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-angle-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">5: Malware and Trojans<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1995\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1995\"><ul><li>Introduction to Malware<\/li><li>Trojans and Backdoors<\/li><li>Protecting Systems from Malicious Software<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1996\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1996\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-angle-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">6: Social Engineering and Phishing<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1996\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1996\"><ul><li>Psychological Manipulation<\/li><li>Social Engineering Techniques<\/li><li>Phishing Attacks<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1997\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-1997\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-angle-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">7: Web Application Penetration Testing<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1997\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-1997\"><ul><li>Identifying Web Application Vulnerabilities<\/li><li>SQL Injection, Cross-Site Scripting, and More<\/li><li>Secure Coding Practices<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1998\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-1998\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-angle-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\"> 8: Network Security Testing<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1998\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-1998\"><ul><li>Scanning and Enumeration<\/li><li>Firewall and IDS Evasion<\/li><li>Wireless Network Security<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1999\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-1999\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-angle-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">9: Post-Exploitation and Reporting<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1999\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-1999\"><ul><li>Maintaining Access and Covering Tracks<\/li><li>Creating Comprehensive Reports<\/li><li>Legal and Ethical Considerations<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-19910\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-19910\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-angle-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">10: Advanced Penetration Testing<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-19910\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-19910\"><ul><li>Cryptography and Encryption<\/li><li>Mobile and IoT Device Security<\/li><li>Red Team vs. Blue Team<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-19911\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"button\" aria-controls=\"elementor-tab-content-19911\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-angle-down\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-angle-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">11: Career Development and Certification<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-19911\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"region\" aria-labelledby=\"elementor-tab-title-19911\"><ul><li>Building a Career in Cybersecurity<\/li><li>Industry-Recognized Certifications<\/li><li>Preparing for Penetration Testing Certification<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-276778d5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"276778d5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e1702c5\" data-id=\"4e1702c5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c57ec0b elementor-widget elementor-widget-heading\" data-id=\"c57ec0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Its the time to Secure your Future<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c3e6ff9 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"4c3e6ff9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/Sir-Ahmad-Fiaz-1.jpg\" title=\"\" alt=\"\" loading=\"lazy\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Ahmad Fiaz<\/h3><p class=\"elementor-image-box-description\">Meet Ahmad Fiaz, your expert instructor at Cyberwing Trainings. As a skilled CEH and cybersecurity trainer with over 15 years of training experience, Ahmad is committed to equipping you with the knowledge and skills necessary to excel in the dynamic realm of cybersecurity. With his extensive background and a passion for sharing his expertise, you're in capable hands as you embark on your journey to become a cybersecurity professional.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Penetration Testing Course in Lahore Welcome to Cyberwing Trainings, Our Penetration Testing Course in Lahore, where you&#8217;ll embark on a journey to become a skilled ethical hacker and cybersecurity expert. This course is designed to equip you with the knowledge and hands-on skills needed to identify and address vulnerabilities in computer systems, networks, and applications. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1100","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Penetration Testing - Cyberwing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberwing.pk\/trainings\/penetration-testing-in-lahore\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Penetration Testing\" \/>\n<meta property=\"og:description\" content=\"Penetration Testing Course in Lahore Welcome to Cyberwing Trainings, Our Penetration Testing Course in Lahore, where you&#8217;ll embark on a journey to become a skilled ethical hacker and cybersecurity expert. This course is designed to equip you with the knowledge and hands-on skills needed to identify and address vulnerabilities in computer systems, networks, and applications. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberwing.pk\/trainings\/penetration-testing-in-lahore\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberwing\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-24T13:52:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/penetration-testing.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/penetration-testing-in-lahore\\\/\",\"url\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/penetration-testing-in-lahore\\\/\",\"name\":\"Penetration Testing - Cyberwing\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/penetration-testing-in-lahore\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/penetration-testing-in-lahore\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/penetration-testing.jpg\",\"datePublished\":\"2023-10-21T20:02:20+00:00\",\"dateModified\":\"2024-06-24T13:52:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/penetration-testing-in-lahore\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/penetration-testing-in-lahore\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/penetration-testing-in-lahore\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/penetration-testing.jpg\",\"contentUrl\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/penetration-testing.jpg\",\"width\":840,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/penetration-testing-in-lahore\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Penetration Testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/#website\",\"url\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/\",\"name\":\"Cyberwing\",\"description\":\"Best Institute for IT Trainings\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/#organization\",\"name\":\"Cyberwing\",\"url\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Logo-New.png\",\"contentUrl\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Logo-New.png\",\"width\":800,\"height\":500,\"caption\":\"Cyberwing\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberwing.pk\\\/trainings\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Penetration Testing - Cyberwing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberwing.pk\/trainings\/penetration-testing-in-lahore\/","og_locale":"en_US","og_type":"article","og_title":"Penetration Testing","og_description":"Penetration Testing Course in Lahore Welcome to Cyberwing Trainings, Our Penetration Testing Course in Lahore, where you&#8217;ll embark on a journey to become a skilled ethical hacker and cybersecurity expert. This course is designed to equip you with the knowledge and hands-on skills needed to identify and address vulnerabilities in computer systems, networks, and applications. [&hellip;]","og_url":"https:\/\/cyberwing.pk\/trainings\/penetration-testing-in-lahore\/","og_site_name":"Cyberwing","article_modified_time":"2024-06-24T13:52:40+00:00","og_image":[{"url":"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/penetration-testing.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberwing.pk\/trainings\/penetration-testing-in-lahore\/","url":"https:\/\/cyberwing.pk\/trainings\/penetration-testing-in-lahore\/","name":"Penetration Testing - Cyberwing","isPartOf":{"@id":"https:\/\/cyberwing.pk\/trainings\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberwing.pk\/trainings\/penetration-testing-in-lahore\/#primaryimage"},"image":{"@id":"https:\/\/cyberwing.pk\/trainings\/penetration-testing-in-lahore\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/penetration-testing.jpg","datePublished":"2023-10-21T20:02:20+00:00","dateModified":"2024-06-24T13:52:40+00:00","breadcrumb":{"@id":"https:\/\/cyberwing.pk\/trainings\/penetration-testing-in-lahore\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberwing.pk\/trainings\/penetration-testing-in-lahore\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberwing.pk\/trainings\/penetration-testing-in-lahore\/#primaryimage","url":"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/penetration-testing.jpg","contentUrl":"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/10\/penetration-testing.jpg","width":840,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/cyberwing.pk\/trainings\/penetration-testing-in-lahore\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberwing.pk\/trainings\/"},{"@type":"ListItem","position":2,"name":"Penetration Testing"}]},{"@type":"WebSite","@id":"https:\/\/cyberwing.pk\/trainings\/#website","url":"https:\/\/cyberwing.pk\/trainings\/","name":"Cyberwing","description":"Best Institute for IT Trainings","publisher":{"@id":"https:\/\/cyberwing.pk\/trainings\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberwing.pk\/trainings\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberwing.pk\/trainings\/#organization","name":"Cyberwing","url":"https:\/\/cyberwing.pk\/trainings\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberwing.pk\/trainings\/#\/schema\/logo\/image\/","url":"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/09\/Logo-New.png","contentUrl":"https:\/\/cyberwing.pk\/trainings\/wp-content\/uploads\/2023\/09\/Logo-New.png","width":800,"height":500,"caption":"Cyberwing"},"image":{"@id":"https:\/\/cyberwing.pk\/trainings\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cyberwing.pk\/trainings\/wp-json\/wp\/v2\/pages\/1100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwing.pk\/trainings\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberwing.pk\/trainings\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberwing.pk\/trainings\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberwing.pk\/trainings\/wp-json\/wp\/v2\/comments?post=1100"}],"version-history":[{"count":22,"href":"https:\/\/cyberwing.pk\/trainings\/wp-json\/wp\/v2\/pages\/1100\/revisions"}],"predecessor-version":[{"id":4043,"href":"https:\/\/cyberwing.pk\/trainings\/wp-json\/wp\/v2\/pages\/1100\/revisions\/4043"}],"wp:attachment":[{"href":"https:\/\/cyberwing.pk\/trainings\/wp-json\/wp\/v2\/media?parent=1100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}