Network Penetration Testing

  • Print

 

Course Overview

As cyber-attacks increase, so does the demand for information security professionals who possess true network penetration testing. This course will prepares you to conduct successful penetration. The course starts with proper planning, scoping and recon, and then dives deep into scanning, target exploitation, password attacks, and wireless with detailed hands-on exercises and practical tips for doing the job safely and effectively.

 

Download Brochure pdf-logo
 

Pre-Requisites

Basic knowledge in security and network

 

Network Penetration – Schedule

Day 1

09.00am – 10.00am

Planning, Scoping, and Recon

  • Information security overview
  • Hacking concepts and phases
10.00am – 10.30am

Breakfast

10.30am – 12.45pm

  • Type of attacks
  • Ethical hacking and penetration tester

12.45pm – 02.15pm

Lunch

02.15pm – 05.00pm

  • Vulnerability research
  • Exercise 1: Dealing with tools (Backtrack, ExploitDB, Nessus)

Day 2

09.00am – 10.00am

Network Penetration Testing: Footprinting, Reconnaissance and Scanning

  • What are footprinting, reconnaissance and scanning?

10.00am – 10.30am

Breakfast

10.30am – 12.45pm

  • Footprinting concept, threats, methodology, tools and countermeasures

12.45pm – 02.15pm

Lunch

02.15pm – 05.00pm

  • Scanning methodology and vulnerability scanning.
  • Exercise 2: Scanning Tools and Vulnerabilities Scanning

                                                                        Day 3

09.00am – 10.00am

Network Penetration Testing: Enumeration and System Hacking

  • Enumeration concepts

10.00am – 10.30am

Breakfast

10.30am – 12.45pm

  • System Hacking and exploit
  • Exercise 3: Metasploit Framework

12.45pm – 02.15pm

Lunch

02.15pm – 05.00pm

  • Wireless Hacking
  • Exercise 4: Wireless Hacking.