Duration: 3 days – 21 hrs
Overview
This course introduces the students the latest ethical hacking tools, this course provides a variety of hands-on practice penetration testing as well as ethical hacking skills to determine vulnerable environments and improve the security.
Objectives
- Upon successful completion of the course you will officially become a Security Professional, which is among the most respected and sought-after designation within the information security space.
Audience
- Cyber Security enthusiasts
- Managers who want to understand information security
- Operations personnel who do not have security as their primary job function but need an understanding of security to be effective
- IT engineers and supervisors
- System Administrators
- Forensic analysts, penetration testers, and auditors
- Anyone new to information security with some background in information systems and networking
Prerequisites
- Basic knowledge of Linux is a plus.
Course Content
Day 1
- Information Gathering using Kali
- Internet based Information Gathering
- Active Information Gathering
- Passive Information Gathering
- Buffer Overflows
- Vulnerability Scanning
- Buffer Overflow Exploit
- Other Exploits
- Hands on Lab
Day 2
- Vulnerability Scanning
- Privilege Escalation
- Client-Side Attacks
- Web App Attacks
- Port Tunnelling
- Authorization Testing
- Authentication Testing
- Hands on Lab
Day 3
- Metasploit Framework
- Evade Antivirus
- Attacks
- File transfers and its vulnerabilities
- Server-Side exploits
- Hands on Lab
- Closing and Remarks