CYBER & INFORMATION SECURITY COMBO TRAINING
Cyber Security | Forensic Security | Ethical Hacking | Application Security | Network Security | Linux | Networking
Course Duration : 200hrs – 6 months
100% Practical Oriented Training .
Be a Cyber Security Expert in 6 Months .
100% Placement Guarantee for the Certified Candidate
Trainer :- 15 + year Cyber Security Working professional
Why Radical Technologies
Topics Covered
- Fundamentals of Networking and CCNA Basics
- Comprehensive Red Hat System Administration
- Mastering Windows Active Directory and Domain Administration with Basics of LDAP
- Comprehensive Web Application Security Training with Practical Labs
- Comprehensive Network Security and Penetration Testing
Fundamentals of Networking and CCNA Basics
Course Overview: This course provides a comprehensive introduction to the fundamentals of networking and covers basic configurations for Cisco Certified Network Associate (CCNA) certification. Participants will learn essential networking concepts, including network architectures, devices, protocols, and configurations. The course includes theoretical explanations, practical demonstrations, and hands-on exercises to ensure a thorough understanding of networking basics and CCNA-level configurations.
Course Objectives:
- Understand the principles of networking, including network architectures and protocols.
- Learn about networking devices such as hubs, switches, and routers and their roles in data forwarding.
- Gain knowledge of IP addressing, subnetting, and basic network topologies.
- Familiarize with Ethernet technology, TCP/UDP protocols, DNS, and DHCP.
- Explore routing concepts, VLANs, and basic Cisco device configurations.
- Advance to more complex topics like ACLs, network naming, IP telephony, QoS, and SDN.
Course Outline:
Module 1: Introduction to Networking
- Overview of networks and networking concepts.
- Introduction to the OSI model.
- Explanation of network devices and their functions.
Module 2: IP Addressing and Subnetting
- Understanding IP addresses and subnet masks.
- Basics of IPv4 and IPv6 addressing.
- Subnetting techniques for efficient network management.
Module 3: Network Protocols and Services
- Introduction to TCP and UDP protocols.
- DNS fundamentals and DHCP for IP address assignment.
- Overview of network routing and VLANs.
Module 4: Ethernet and Network Topologies
- Exploring Ethernet technology and its variations.
- Understanding different network topologies (star, bus, ring).
Module 5: Cisco Device Configurations
- Initial configurations of Cisco devices.
- Basics of Cisco IOS and CLI commands.
Module 6: Advanced Network Configurations
- Configuring ACLs for traffic control.
- Implementing network naming conventions.
- Introduction to IP telephony and QoS.
Module 7: Software-Defined Networking (SDN)
- Overview of SDN concepts and architectures.
- Understanding the OpenFlow protocol.
Hands-On Labs:
- Configuring IP addresses and subnet masks.
- Setting up basic network services like DNS and DHCP.
- Implementing VLANs and routing protocols.
- Configuring Cisco devices using CLI commands.
- Setting up ACLs and QoS policies.
- Introduction to SDN with practical exercises.
Conclusion: This course provides participants with a solid foundation in networking principles and essential CCNA-level configurations. By combining theoretical knowledge with practical hands-on experience, participants will be well-prepared to pursue further certifications and careers in networking and information technology.
Comprehensive Red Hat System Administration
Course Overview: This comprehensive course provides a solid foundation in Red Hat system administration, covering core administration tasks, user and group management, file systems, security, network services, and cronjob scheduling. Participants will gain hands-on experience in managing Red Hat Enterprise Linux (RHEL) systems, along with basic scripting skills to automate tasks efficiently.
Target Audience: IT professionals with no prior Linux administration experience seeking to become proficient in Red Hat system administration and basic scripting.
Course Objectives:
- Understand the core functionalities and architecture of Red Hat Enterprise Linux (RHEL).
- Navigate and effectively utilize the Linux command line for system administration tasks.
- Manage user and group accounts, permissions, and access controls.
- Configure and administer local storage devices and file systems.
- Install, update, and manage software packages using package managers.
- Implement basic security practices for user accounts, file systems, and network services.
- Understand and configure essential network services like SSH.
- Gain practical experience through hands-on labs in a virtualized Red Hat environment.
- Learn basic scripting skills to automate repetitive tasks.
- Configure cronjobs to schedule tasks on a regular basis and automate system maintenance.
Course Structure:
Module 1: Introduction to Red Hat Enterprise Linux (RHEL)
- Introduction to Linux and open-source ecosystem
- Overview of Red Hat Enterprise Linux (RHEL) features and architecture
- Navigating the GNOME desktop environment
- Introduction to the Linux command line and basic shell commands
Module 2: User and Group Management
- Creating, modifying, and deleting user and group accounts
- Assigning permissions and managing access controls
- Understanding file ownership and permissions (chmod, chown)
- Utilizing sudo for administrative tasks
Module 3: File System Management
- Overview of the Linux file system hierarchy
- Working with directories and files using command-line tools (mkdir, cp, mv, rm)
- Managing file permissions and ownership
- Exploring file systems and storage devices
Module 4: Package Management with yum and dnf
- Introduction to package management in RHEL
- Using yum and dnf commands for managing software packages
- Managing package repositories and dependencies
Module 5: Security Fundamentals
- Understanding security concepts in RHEL
- Managing user accounts, access controls, and permissions securely
- Securing file system permissions and implementing security best practices
- Introduction to basic firewall rules
Module 6: Network Services and SSH
- Overview of network services in RHEL
- Configuring and managing SSH for secure remote access
- Exploring other essential network services like DNS and NTP
Module 7: Introduction to System Administration Tools
- Introduction to essential RHEL system administration tools (e.g., systemd, SELinux)
- Managing system startup and shutdown processes
- Understanding basic system logging and troubleshooting
Module 8: Basic Scripting
- Introduction to scripting languages (e.g., Bash)
- Writing and executing basic shell scripts for automation
- Using variables, loops, and conditional statements in scripts
Module 9: Cronjob Scheduling
- Understanding cronjob functionalities and benefits
- Creating and editing crontabs using the crontab command
- Utilizing cron expressions for defining task execution schedules (minutes, hours, days, months, weekdays)
- Scheduling various tasks using cronjobs (e.g., backups, reports, system maintenance)
- Securing cronjob configurations (ownership, permissions)
Module 10: Hands-on Labs Throughout the course, participants will engage in hands-on labs in a virtualized Red Hat environment. These labs will reinforce theoretical concepts through practical exercises, allowing them to gain experience with core administration tasks, basic scripting, and configuring cronjobs.
Course Assessment: The course assessment may include quizzes, practical exercises focused on core administration tasks, basic scripting, and cronjob configuration, as well as a final project simulating real-world system administration scenarios.
Additional Notes:
- This course aligns with the objectives of the Red Hat System Administration I (RH124) course but does not include certification preparation.
- Students can find additional resources and practice materials on the Red Hat documentation website.
Mastering Windows Active Directory and Domain Administration with Basics of LDAP
Course Overview: This comprehensive course equips participants with the expertise to effectively manage and secure Windows Active Directory (AD), the core foundation for user and group management in Windows domains. Through in-depth exploration of AD concepts, user and group administration, Group Policy, and security best practices, participants will gain the necessary skills to excel in domain administration tasks.
Target Audience: Ideal for IT professionals, system administrators, and individuals seeking proficiency in managing Windows Active Directory environments.
Course Objectives:
- Understand the core functionalities and architecture of Windows Active Directory.
- Navigate Active Directory Users and Computers (ADUC) snap-in for efficient management of users, groups, and objects.
- Create, configure, and manage user accounts, groups, and organizational units (OUs) within an AD domain.
- Implement Group Policy Objects (GPOs) to centrally manage user and computer settings.
- Configure Group Policy for security, software deployment, scripts, and user environment customization.
- Understand and configure Active Directory replication for data consistency across domain controllers.
- Implement and manage site configuration for optimized network performance in geographically dispersed domains.
- Utilize Active Directory tools for user management, troubleshooting, and disaster recovery.
- Implement best practices for securing Active Directory and mitigating security risks.
Course Structure:
Module 1: Introduction to Active Directory
- Understanding Active Directory and its role in Windows domains.
- Active Directory architecture: forests, domains, trees, and sites.
- Active Directory objects: users, groups, computers, and OUs.
- Introduction to Active Directory Users and Computers (ADUC) snap-in.
Module 2: User and Group Management
- Creating, modifying, and managing user accounts.
- Assigning user permissions and group memberships.
- Utilizing Active Directory groups for efficient user management.
- Implementing delegation of control for user and group administration.
Module 3: Group Policy Management
- Understanding Group Policy and its benefits for centralized management.
- Creating, linking, and applying Group Policy Objects (GPOs).
- Configuring Group Policy for various settings (security, software deployment, scripts, etc.).
- Group Policy Preferences for user environment customization.
Module 4: Active Directory Security
- Securing Active Directory and mitigating security risks.
- Managing user accounts and access controls securely.
- Group Policy for security settings (password policy, account lockout, etc.).
- Best practices for Active Directory security and hardening.
Module 5: Active Directory Replication and Site Configuration
- Understanding Active Directory replication for data consistency.
- Configuring replication for optimal performance across domain controllers.
- Implementing site configuration for geographically dispersed domains.
- Utilizing Active Directory replication tools for monitoring and troubleshooting.
Module 6: Hands-on Labs: Throughout the course, participants will engage in hands-on labs in a simulated Active Directory environment. These labs will reinforce theoretical concepts through practical exercises, allowing them to gain experience with user and group management, Group Policy configuration, security settings, and essential administration tasks.
Course Assessment: The course assessment may include quizzes to test knowledge acquisition, practical exercises focused on user and group management, Group Policy configuration, and security settings, as well as a final project simulating real-world domain administration scenarios.
Additional Notes:
- This course assumes a basic understanding of Windows networking concepts.
- Students can find additional resources and practice materials on Microsoft documentation websites.
LDAP
- Directory Services: LDAP is designed to provide access to directory services, which store and organize information about users, devices, applications, and other resources in a hierarchical structure. Directory services are commonly used for centralized authentication, authorization, and directory lookups in networked environments.
- Hierarchical Data Model: LDAP directories use a hierarchical data model similar to a tree structure. The data is organized into entries, each of which represents an object (e.g., user, group, device) and is identified by a unique Distinguished Name (DN). Entries are organized into a tree-like structure called the Directory Information Tree (DIT), with parent-child relationships between entries.
- Attributes and Object Classes: Entries in an LDAP directory consist of attributes, which are pieces of information associated with the object. Attributes define the characteristics or properties of the object, such as name, email address, phone number, etc. Object classes define the type of object and specify which attributes can be associated with it.
- Protocol Operations: LDAP defines a set of protocol operations for querying, modifying, and managing directory information. Some common LDAP operations include:
-
- Bind: Authenticates the client to the directory server.
- Search: Retrieves directory entries matching specified criteria.
- Add: Adds a new entry to the directory.
- Modify: Modifies attributes of an existing entry.
- Delete: Deletes an entry from the directory.
- LDAP URLs: LDAP uses URLs (Uniform Resource Locators) to identify directory entries and perform operations on them. LDAP URLs have a specific format (ldap://hostname:port/DN) and can be used to locate and access directory entries.
- Security: LDAP supports various authentication mechanisms and encryption methods to secure communication between LDAP clients and servers. Commonly used security mechanisms include Simple Authentication and Security Layer (SASL) and Transport Layer Security (TLS/SSL).
Comprehensive Web Application Security Training with Practical Labs
Introduction
- Overview of the course objectives and structure.
- Importance of web application security in modern software development and the role of penetration testing.
- Pre-engagement procedures and methodologies for conducting security assessments.
Module 1: Introduction to Web Applications
- Understanding the HTTP/S Protocol Basics
- Encoding: Concepts and Techniques
- Same Origin Policy and its Importance
- Cookies: Functionality and Security Implications
- Sessions: Management and Security
- Web Application Proxies: Utilizing Burp Suite and OWASP ZAP for Security Testing
Practical Lab: Setting Up Burp Suite and OWASP ZAP, Intercepting and Analyzing Web Traffic, Session Management Testing.
Module 2: Information Gathering
- Techniques for Gathering Information on Target Applications
- Infrastructure Assessment: Identifying Network Components
- Fingerprinting Frameworks and Applications
- Enumerating Resources and Identifying Entry Points
- Leveraging Misconfigurations for Gathering Relevant Information
- Google Hacking and Shodan HQ for Reconnaissance
Practical Lab: Information Gathering Using Various Tools and Techniques, Performing Google Hacking Searches, Analyzing Shodan Search Results.
Module 3: Cross-Site Scripting (XSS)
- Understanding Cross-Site Scripting (XSS) Attacks
- Anatomy of XSS Exploitation
- Types of XSS: Reflected, Stored, and DOM-based
- Techniques for Finding and Exploiting XSS Vulnerabilities
- Mitigation Strategies for XSS Attacks
Practical Lab: Identifying and Exploiting XSS Vulnerabilities, Crafting XSS Payloads, Implementing XSS Mitigation Techniques.
Module 4: SQL Injection (SQLi)
- Introduction to SQL Injection (SQLi) Attacks
- Identifying and Exploiting Error-based and Blind SQL Injections
- Automated SQL Injection Tools and Techniques
- Strategies for Finding and Mitigating SQL Injection Vulnerabilities
Practical Lab: Performing SQL Injection Attacks, Extracting Data from Databases, Implementing Parameterized Queries to Mitigate SQL Injection.
Module 5: Authentication and Authorization
- Overview of Authentication and Authorization Mechanisms
- Common Vulnerabilities in Authentication Systems
- Bypassing Authorization Controls
- Implementing Secure Authentication and Authorization Practices
Practical Lab: Testing Authentication and Authorization Mechanisms, Exploiting Authentication and Authorization Flaws, Implementing Strong Authentication and Authorization Controls.
Module 6: Session Security & CSRF
- Weaknesses in Session Management
- Session Hijacking and Fixation Attacks
- Cross-Site Request Forgery (CSRF) Exploitation and Mitigation Techniques
Practical Lab: Session Hijacking and Fixation Attacks, Crafting and Exploiting CSRF Vulnerabilities, Implementing CSRF Protection Measures.
Module 7: Remote Code Execution (RCE)
- Understanding Remote Code Execution Vulnerabilities
- Exploiting RCE to Gain Unauthorized Access
- Strategies for Mitigating RCE Vulnerabilities
Practical Lab: Exploiting Remote Code Execution Vulnerabilities, Gaining Shell Access, Implementing Controls to Prevent RCE Attacks.
Module 8: HTML5 Security
- Security Implications of HTML5 Features
- Cross-Windows Messaging
- Web Storage and Its Risks
- WebSocket Security Considerations
- Sandboxed Frames and Their Limitations
Practical Lab: Exploiting HTML5 Features for Security Attacks, Mitigating HTML5 Security Risks.
Module 9: File and Resource Attacks
- File Inclusion Vulnerabilities: Types and Exploitation Techniques
- Risks Associated with Unrestricted File Uploads
- Mitigating File and Resource-Based Attacks
Practical Lab: Exploiting File Inclusion and Unrestricted File Upload Vulnerabilities, Implementing Security Controls to Prevent File-Based Attacks.
Module 10: Other Attacks
- Command Injection: Exploitation and Prevention
- Price Manipulation Techniques in Web Applications
- OTP Bypassing Attacks
- Denial of Service (DoS) Techniques and Mitigation
Practical Lab: Performing Command Injection Attacks, Manipulating Prices in Web Applications, Implementing Countermeasures Against DoS Attacks.
Module 11: Web Services Security
- Overview of Web Services and Their Security Challenges
- Understanding the WSDL Language
- Attacks on Web Services and Strategies for Protection
Practical Lab: Assessing Web Services Security, Exploiting Web Service Vulnerabilities, Implementing Security Controls for Web Services.
Module 12: XPath Injection
- Introduction to XPath and XPath Injection
- Detecting and Exploiting XPath Injection Vulnerabilities
- Defensive Techniques to Prevent XPath Injection Attacks
Practical Lab: Exploiting XPath Injection Vulnerabilities, Implementing Defenses Against XPath Injection Attacks.
Module 13: Penetration Testing Content Management Systems (CMS)
- Introduction to CMS Security Assessment
- Penetration Testing WordPress, Joomla, and Other CMS Platforms
- Brute Force Attacks and Countermeasures in CMS Environments
Practical Lab: Penetration Testing CMS Platforms, Exploiting CMS Vulnerabilities, Implementing Security Controls for CMS.
Module 14: Penetration Testing NoSQL Databases
- Understanding NoSQL Fundamentals and Their Security Implications
- Exploiting NoSQL Databases for Unauthorized Access
- Strategies for Securing NoSQL Databases Against Common Attacks
Practical Lab: Penetration Testing NoSQL Databases, Exploiting NoSQL Vulnerabilities, Implementing Security Measures for NoSQL Databases.
Each module includes practical labs to reinforce theoretical concepts and provide hands-on experience with various tools and techniques. These labs allow participants to apply their knowledge in a controlled environment, gaining valuable skills and experience in web application security testing.
Comprehensive Network Security and Penetration Testing
Course Overview: This course offers a comprehensive exploration of network security fundamentals and penetration testing methodologies. Participants will gain practical knowledge and hands-on experience in identifying network vulnerabilities, analyzing network traffic, and executing basic penetration testing techniques. Through a series of modules, participants will delve into essential tools, techniques, and best practices to secure networks and conduct effective penetration testing.
Course Structure:
Module 1: Introduction to Network Security
- Definition and significance of network security
- Common threats to network security (e.g., malware, unauthorized access)
- Overview of network security controls and best practices
Module 2: Penetration Testing Framework – Kali Linux
- Introduction to penetration testing concepts
- Overview of Kali Linux and its penetration testing tools (e.g., nmap, Metasploit)
- Setting up and utilizing Kali Linux in a safe environment
Module 3: Analyzing Network Traffic
- Introduction to network protocols (e.g., TCP/IP)
- Capturing and analyzing network traffic using Wireshark
- Filtering and interpreting network traffic data
Module 4: Packet Analysis with Tshark
- Introduction to Tshark for command-line packet analysis
- Capturing and analyzing network traffic using Tshark commands
- Filtering and scripting for efficient traffic analysis
Module 5: Detecting Live Systems and Analyzing Results
- Techniques for identifying active systems on a network (e.g., ping sweeps, ARP scans)
- Analyzing results from network enumeration tools
Module 6: Nmap Advanced Port Scan
- Advanced port scanning techniques using Nmap
- Utilizing Nmap scripts and NSE for customized scanning
- Identifying potential vulnerabilities based on discovered services and ports
Module 7: Metasploit: Introduction to Exploitation
- Overview of Metasploit and its functionalities
- Understanding exploit frameworks and their usage
- Launching basic exploits against vulnerable systems using Metasploit
Module 8: Dictionary & Password Attacks
- Introduction to password cracking techniques (e.g., brute-force, dictionary attacks)
- Utilizing password cracking tools in a controlled environment
- Best practices for password security
Module 9:
FTP Penetration Testing
- Exploring vulnerabilities in FTP servers
- Techniques for exploiting FTP vulnerabilities
SSH Penetration Testing
- Identifying vulnerabilities in SSH protocols
- Exploiting SSH vulnerabilities using tools (e.g., dictionary attacks)
Telnet Penetration Testing (if applicable)
- Understanding Telnet vulnerabilities
- Techniques for exploiting Telnet vulnerabilities in controlled environments
SMTP Penetration Testing
- Exploring vulnerabilities in SMTP servers
- Techniques for exploiting SMTP vulnerabilities ****
DNS & DHCP Penetration Testing
- Understanding vulnerabilities in DNS and DHCP
- Exploiting DNS and DHCP vulnerabilities
NetBIOS & SMB Penetration Testing
- Introduction to NetBIOS and SMB protocols
- Exploring vulnerabilities in network file sharing protocols
- Exploiting NetBIOS and SMB vulnerabilities
MySQL Penetration Testing (if applicable)
- Introduction to MySQL database vulnerabilities
- Techniques for exploiting MySQL vulnerabilities
Remote Desktop Penetration Testing
- Identifying vulnerabilities in RDP
- Techniques for exploiting RDP vulnerabilities
Module 10: Windows Privilege Escalation
- Understanding Windows privilege escalation techniques.
- Exploiting misconfigurations and vulnerabilities to escalate privileges on Windows systems.
Module 11: Linux Privilege Escalation
- Understanding Linux privilege escalation techniques.
- Exploiting misconfigurations and vulnerabilities to escalate privileges on Linux systems.
Module 22: Covering Tracks & Maintaining Access
- Techniques for concealing evidence of penetration testing activities
- Maintaining access to compromised systems for further analysis
Course Conclusion: In conclusion, this course equips participants with a comprehensive understanding of network security principles and penetration testing methodologies. By mastering the tools, techniques, and best practices covered in this course, participants will be prepared to identify and mitigate network vulnerabilities effectively.
Most Probable Interview Questions for Cyber Security & Information Security
Interview Question No. 1 for Cyber Security & Information Security : What are the key differences between symmetric and asymmetric encryption, and in what scenarios would you use each?
Interview Question No. 2 for Cyber Security & Information Security : How would you go about conducting a vulnerability assessment and penetration testing on a corporate network?
Interview Question No. 3 for Cyber Security & Information Security : Can you explain the concept of a zero-day vulnerability and how it can impact an organization’s security posture?
Interview Question No. 4 for Cyber Security & Information Security : What are some common methods used to detect and prevent DDoS attacks?
Interview Question No. 5 for Cyber Security & Information Security : Describe the process of implementing a multi-factor authentication (MFA) system in an enterprise environment.
Interview Question No. 6 for Cyber Security & Information Security : How do you stay updated with the latest cybersecurity threats and trends?
Interview Question No. 7 for Cyber Security & Information Security : What steps would you take to secure a web application from common threats such as SQL injection and cross-site scripting (XSS)?
Interview Question No. 8 for Cyber Security & Information Security : Can you explain the role of a Security Information and Event Management (SIEM) system in an organization’s security infrastructure?
Interview Question No. 9 for Cyber Security & Information Security : What is the difference between a white hat, black hat, and grey hat hacker, and what ethical considerations apply to each?
Interview Question No. 10 for Cyber Security & Information Security : Describe how you would handle and investigate a suspected data breach incident within a company.
Learn Cyber Security & Information Security – Course in Pune with Training, Certification & Guaranteed Job Placement Assistance!
Welcome to Radical Technologies, the leading institute in Pune for comprehensive Cyber Security and Information Security training. We offer a range of meticulously designed courses tailored to equip you with the skills needed to excel in the cybersecurity field. Our offerings include Cyber Security Courses, Ethical Hacking Courses, and Certified Ethical Hacking Courses, all of which are structured to provide hands-on training and industry-recognized certifications.
Cyber Security Course in Pune: Our Cyber Security Course is renowned for its depth and practical approach. Designed for both beginners and professionals, our course covers the latest trends and techniques in cybersecurity. Whether you are looking to advance your career or start a new one, our course will provide you with the knowledge and skills you need.
Ethical Hacking Course Pune: Dive into the world of ethical hacking with our specialized Ethical Hacking Course. Learn the fundamentals of hacking, the methodologies hackers use, and how to protect systems from attacks. Our Certified Ethical Hacking Course offers in-depth training and prepares you for the CEH certification.
Cyber Security Certification: At Radical Technologies, we understand the importance of certification in today’s job market. Our Cyber Security Certification Course is designed to provide you with the credentials that employers seek. Our certification is recognized globally, giving you a competitive edge in the cybersecurity field.
Flexible Learning Options: We offer both online and in-person classes to suit your schedule. Our Cyber Security Classes in Pune provide an interactive learning environment, while our Cyber Security Course Online allows you to learn at your own pace. Both options ensure you receive the same high-quality training from our expert instructors.
Affordable Course Fees: We believe in making quality education accessible. Our Cyber Security Course Fees and Ethical Hacking Course Fees are competitively priced, ensuring you get the best value for your investment.
Job Assistance: Radical Technologies is committed to your success. Our Cyber Security Training and Placement program provides you with job assistance, helping you secure a position in the cybersecurity field upon completion of your course.
Specialized Training: In addition to our general courses, we offer specialized training in Network Security and Information Security. These courses provide targeted knowledge and skills, preparing you for specific roles within the cybersecurity industry.
Join us at Radical Technologies, the Best Cyber Security Institute in Pune, and take the first step towards a rewarding career in cybersecurity. Our Cyber Security Training Courses are designed to provide you with comprehensive knowledge, practical skills, and the certifications you need to succeed. Start your journey with us today and become a part of the elite group of cybersecurity professionals.
Online Batches Available for the Areas
Ambegaon Budruk | Aundh | Baner | Bavdhan Khurd | Bavdhan Budruk | Balewadi | Shivajinagar | Bibvewadi | Bhugaon | Bhukum | Dhankawadi | Dhanori | Dhayari | Erandwane | Fursungi | Ghorpadi | Hadapsar | Hingne Khurd | Karve Nagar | Kalas | Katraj | Khadki | Kharadi | Kondhwa | Koregaon Park | Kothrud | Lohagaon | Manjri | Markal | Mohammed Wadi | Mundhwa | Nanded | Parvati (Parvati Hill) | Panmala | Pashan | Pirangut | Shivane | Sus | Undri | Vishrantwadi | Vitthalwadi | Vadgaon Khurd | Vadgaon Budruk | Vadgaon Sheri | Wagholi | Wanwadi | Warje | Yerwada | Akurdi | Bhosari | Chakan | Charholi Budruk | Chikhli | Chimbali | Chinchwad | Dapodi | Dehu Road | Dighi | Dudulgaon | Hinjawadi | Kalewadi | Kasarwadi | Maan | Moshi | Phugewadi | Pimple Gurav | Pimple Nilakh | Pimple Saudagar | Pimpri | Ravet | Rahatani | Sangvi | Talawade | Tathawade | Thergaon | Wakad