Over

120,000

Worldwide

Saturday - Sunday CLOSED

Mon - Fri 8.00 - 18.00

Call us

 

ETHICAL Hacking Network Penetration Testing Masterclass


This course teaches the principles and techniques of security threats and vulnerabilities. Delegates will also learn how to: 1. Design network and implement security measures, procedures 2. Conceive various security policies 3. Conduct network penetration testing 4. Plan data and disasters recovery guidelines LEARNING OUTCOMES Upon successful completion of this course, the delegate will be able to: 1. Be able to design a secure system. 2. Understand and explain the standard cryptographic tools 3. Implement encryption and decryption algorithms DES, 3DES, AES, … 4. Enforce authentication, confidentiality, authorization, access control, and confidentiality procedures. 5. Apply apache, and IIS web servers’ security policies. 6. Create digital certificates and enable SSL for critical web pages. 7. Build security associations for the IPSEC protocol security authentication methods. 8. Understand and evaluate security vulnerabilities in different type of software to avoid sever attacks like the SQL injections, cross site scripting, and buffer overflow.
by admin09
Free
15 Lessons
0 Students

 

SSUCv3H4sIAAAAAAAEAJ2RS27EIBBE95FyB4u1LYEgTpyrjLJoPnFaw5gI8ETRyHcPHyOxzo563QVdzeP5aRiIhICKvA+PrJJGa/cQPUR0W8J0PLnRGJ1HsBlmdpQKCRHiHkzIV5xIQTRr6q3w9Ld3LlUPrVCKyZFKhIwdC7ssrKFj/LezHj5aFFjNpn7LwF0Qb6yBGuRSW8n1Jxp/66PdURvXadg1ui7l3Smw2cC7m789KtzWzubil/H9xtLK3a0Dm4tlkjMY0WmlWTLOBKVU0NeZcco5Y6R9g1NX1P2sqLNjNkzqhX1OUsp5EuwFpjcq5kkJvXAQsGjN06aOP2qqn+MOAgAA

your network

This course introduces the student to the fundamental procedures of how to perform a thorough and accurate assessment of the network’s security for an organization through the three types of penetration tests: black-box, white-box, and gray-box or crystal-box. Topics include: Fingerprinting/footprinting, scanning, enumeration, honeypots/honeynets, SQL injection, cross site scripting, session hijacking, system hacking (escalating privileges, execution of known application), installation of rootkits, and denial of service attacks. Students also learn how to perform simulated attacked on virtual networks.

Lessons

Cluster 1

Course intro, syllabus discussion. And Signing student agreement Ethical Hacking and Network Defense The Role of Security and Penetration Testers Penetration-Testing Methodologies Certification Programs for Network Security Personnel What You […]

Cluster 2

  TCP/IP Concepts Review. TCP Header Format. TCP Segment Headers. TCP Flags. Initial Sequence Number (ISN). TCP Ports. Blocking Ports. Demonstration (Wireshark Packet Sniffer). User Datagram Protocol (UDP). The Internet […]

Cluster 3

  Network and Computer Attacks. Malicious Software (Malware). Viruses. Antivirus Software. Base 64 Encoding. Writing Viruses. ATM Machine Worms Laboratory Session

Cluster 4

  Firewalls. Trojan Demonstration. Improved Trojan. Spyware. Adware. Protecting Against Malware Attacks. Educating Your Users. Denial-of-Service Attacks. Distributed Denial- of-Service Attacks. Buffer Overflow Attacks. Ping of Death Attacks. Session Hijacking. […]

Cluster 5

  Footprinting and Social Engineering Using Web Tools for Footprinting. Conducting Competitive Intelligence. Analyzing a Company’s Web Site. Setting a Proxy Server in Firefox. Spider Results. Using Other Footprinting Tool. […]

Cluster 6

  Port Scanning.  Types of Port Scans. Net Scan Tools Pro. Conducting Ping Sweeps.  F Ping Smurf Attack. Crafting IP Packets. Understanding Shell Scripting Introduction to Enumeration. NBT scan. Enumerating

Cluster 7

  Microsoft Operating Systems. Null Session Information. NULL Sessions in Win XP and 2003 Server. Net Scan Tools Pro. DumpSec. NessusWX. Ether leak Vulnerability. NetWare Enumeration Tools. Enumerating the *NIX […]

Cluster 8

  Using Social Engineering to Attack Remote Linux Systems

Cluster 9

  Trojans, Rootkits, LRK5 Rootkit Detectors Demonstration of rkhunter Creating Buffer Overflow Programs Avoiding Buffer Overflows Countermeasures Against Linux Remote Attacks

Cluster 10

  Laboratory Session Hacking Web Servers Web Application Components Common Gateway Interface Apache Web Server Using Scripting Languages Connecting to Databases Attackers controlling a Web server

Cluster 11

  Open Web Application Security Project (OWASP) Top-10 Web application vulnerabilities Application Vulnerabilities Countermeasures Assessing Web Applications SQL Injection Example Tools of Web Attackers and Security Testers

Cluster 11

  Open Web Application Security Project (OWASP) Top-10 Web application vulnerabilities Application Vulnerabilities Countermeasures Assessing Web Applications SQL Injection Example Tools of Web Attackers and Security Testers

Cluster 12

  Tools of Web Attackers and Security Testers cgiscan and WebGoat Laboratory Session Hacking Wireless Networks Understanding Wireless Technology Components of a Wireless Network Service Set Identifiers (SSIDs) Wireless Router […]

Cluster 13

  NetStumbler Kismet Understanding Wireless Hacking AirSnort WEPCrack Sniffing Wireless Traffic De- authentication DoS Attack Countermeasures for Wireless Attacks

Cluster 14

  Cracking WEP Legal Concerns Wireless NIC Modes Wi-Fi NIC Manufacturers A Simple WEP Crack Packet Injection AP & Client Requirements Listener Requirements Injector Requirements
ABOUT US

All you need to feel prepared for your exams, with the confidence to succeed. All you need to feel prepared for your exams succeed.

All you need to feel prepar
ed for your exams, with the confidence to succeed. All you need to feel

BUY THIS THEME

CONTACT US

Skilled is also likely to be focused on fast and bright teaching, it's a great type of courses to...
  • The Aislin Themes Inc. Best Avenue 16-2, CA 23653, USA
  • +1 998 71 150 30 20
  • +1 998 71 150 30 22
  • info@aislinthemes.com
WORKING HOURS

  • Monday9am - 6pm
  • Tuesday9am - 6pm
  • Wednesday9am - 6pm
  • Thursday9am - 6pm
  • Friday9am - 6pm
  • SaturdayClosed
  • SundayClosed