Training Calendar

Mon Tue Wed Thu Fri Sat Sun
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30

psmb

Total Visitors

65.7%United States United States
31%Canada Canada
0.9%Russian Federation Russian Federation
0.6%China China
0.6%United Kingdom United Kingdom
0.4%Australia Australia
0.3%Greece Greece
0%Malaysia Malaysia
0%France France
0%Islamic Republic Of Iran Islamic Republic Of Iran

Today: 4
Yesterday: 13
This Week: 646
Last Week: 2794
This Month: 5068
Last Month: 1398
Total: 59189

Network Penetration Testing

 

Course Overview

As cyber-attacks increase, so does the demand for information security professionals who possess true network penetration testing. This course will prepares you to conduct successful penetration. The course starts with proper planning, scoping and recon, and then dives deep into scanning, target exploitation, password attacks, and wireless with detailed hands-on exercises and practical tips for doing the job safely and effectively.

 

 

Pre-Requisites

Basic knowledge in security and network

 

Network Penetration – Schedule

Day 1

09.00am – 10.00am

Planning, Scoping, and Recon

  • Information security overview
  • Hacking concepts and phases
10.00am – 10.30am

Breakfast

10.30am – 12.45pm

  • Type of attacks
  • Ethical hacking and penetration tester

12.45pm – 02.15pm

Lunch

02.15pm – 05.00pm

  • Vulnerability research
  • Exercise 1: Dealing with tools (Backtrack, ExploitDB, Nessus)

Day 2

09.00am – 10.00am

Network Penetration Testing: Footprinting, Reconnaissance and Scanning

  • What are footprinting, reconnaissance and scanning?

10.00am – 10.30am

Breakfast

10.30am – 12.45pm

  • Footprinting concept, threats, methodology, tools and countermeasures

12.45pm – 02.15pm

Lunch

02.15pm – 05.00pm

  • Scanning methodology and vulnerability scanning.
  • Exercise 2: Scanning Tools and Vulnerabilities Scanning

                                                                        Day 3

09.00am – 10.00am

Network Penetration Testing: Enumeration and System Hacking

  • Enumeration concepts

10.00am – 10.30am

Breakfast

10.30am – 12.45pm

  • System Hacking and exploit
  • Exercise 3: Metasploit Framework

12.45pm – 02.15pm

Lunch

02.15pm – 05.00pm

  • Wireless Hacking
  • Exercise 4: Wireless Hacking.