
DATES
6 - 10 October 2025

DURATION
5 days

DELIVERY
In-person

TIMING
9:00 AM - 4:00 PM

TRAINER
Mr Sankar Raj Soobramanian

VENUE
Gold Crest Hotel

FEES
Rs 50,000

HRDC REFUND
Up to 90% refundable (subject to HRDC eligibility and conditions)
![]() |
Breaks: |
Tea Break
|
10:30 - 10:45 AM
|
Prerequisites
- Basic understanding of networking and cybersecurity fundamentals
- Prior knowledge of web application security is beneficial
- Basic familiarity with scripting or automation is helpful
Target Audience
- Ethical hackers, penetration testers, cybersecurity researchers
- Security analysts looking to improve hands-on skills with AI
- Bug bounty hunters eager to leverage AI for better results
Course Objectives
By the end of the course, participants will:
- Confidently use AI tools for advanced recon and exploitation.
- Build simple custom AI scripts for pentesting tasks.
- Improve bug bounty results with smarter automation.
- Apply AI to real-world web and API attacks.
- Stay ahead with future-ready ethical hacking skills.
Training Content:
Day | Topics Covered | |
Day 1 | Morning | Introduction & Setup: Overview, Lab Setup, Tool Installation Advanced Recon: Subdomain enumeration, directory brute-forcing |
Afternoon | Advanced Recon Part 2: API hunting, SpiderFoot HX ML modules, Hands-on ReconAI Bot | |
Day 2 | Morning | Deep Attack Surface Identification: Manual + AI Recon, Custom wordlists & payloads, Hands-on |
Afternoon | Exploiting Web Apps Part 1: Auth bypass, XSS, SSRF, IDOR, Hands-on with Burp Suite GPT |
|
Day 3 | Morning | Exploiting Web Apps Part 2: Dynamic payloads with LLMs, Prompt engineering, Hands-on automation |
Afternoon | API Security Testing Part 1: Common API vulns, tools, Postman AI for test generation | |
Day 4 | Morning | API Security Testing Part 2: AI for API discovery, Building scripts, Hands-on end-to-end testing |
Afternoon | Bug Bounty Strategies: Case studies, AI for reporting & summarizing, Hands-on correlation | |
Day 5 | Morning | Hands-on Labs: Attack simulations, Real-world vulnerable apps, AI-driven exploitation |
Afternoon | Hands-on Labs Part 2: Custom AI tools for recon/fuzzing, Virtual pentesting assistant, Wrap-up |