register
Pioneers in Training on GNU/LINUX and FOSS Technologies. Your IP : 52.14.85.76 Country : UNITED STATES Region : OHIO Longitude : -83.0061 Latitude : 39.9625 Forex Rate : $ 0
LLC 501 CYBERSECURITY AND ETHICAL HACKING I TRAINING
COURSE DESCRIPTION
Cybersecurity and Ethical Hacking I covers information gathering and reconnaissance, scanning and enumeration, gaining access, privilege escalation, maintaining access and covering tracks. It is a hands-on practical training on how to assess the security posture of your organization before the “bad guys” do it. The course is designed in a way to allow you to understand how attacks are commonly carried out by malicious users. You will learn how to apply ethically hacking tools and techniques to gain unauthorized access to information assets. The main objective of the course is to understand the mindset of a malicious users in order to protect your organization from common attacks.
COURSE OUTLINE

1. Reconnaissance

  • What is Reconnaissance
  • DNS Reconnaissance and Dig
  • Google Hacking
2. Nmap Scanning
  • TCP and UDP Port Scanning
  • Nmap Scanning
3. OS Fingerprinting and Enumeration
  • Enumerating Running Services
  • OS Fingerprinting

4. Web Application Attacks

  • Online Password Cracking
  • Offline Password Cracking
  • Database Attacks
  • Metasploit’s WMAP
  • Direct Database Attacks
  • Metasploit’s DB Attacks
  • Pass The Hash
  • Token Stealing

5. Phishing and Social Engineering

  • MetaPhish
  • Client-side Exploits using Java, PDF and Binary Payloads
  • Internal Information Gathering
  • Gaining Access to Internal Systems

6. Wireless Security

  • Fast WPA Cracking
  • Hotspot Security
  • Unauthorized Access and Session Hijacking
  • Wireless Client Attacks using Rogue Access Points and Preferred Network List (PNL)
  • Wireless Network Attacks using EAP Types and Braking Radius

7. Advanced Covert Channels

  • Evading the Firewall using Port Forwarding Techniques
  • Netcat using Bing Shell, Reverse Shell and Netcat Relays
  • Keeping Access using Backdoors and Sniffers
  • Covering Tracks using Clean Logs and Command History

 

AUDIENCE

  • ICT Managers / Directors
  • System and Network Administrators
  • Database Administrators
  • Security Officers
  • Finance Officers and Auditors
  • Software Engineers, Web and Mobile Application Developers

PREREQUISITE

  • Proficiency in GNU and UNIX Commands or
  • LPIC 1 Linux System and Network Administration Certification

DURATION

  • 5 Days (30 Hours)