Network Pentesting

Click Here to Fill the Enquiry Form

Course No: IS0022
This training program will cover hands on network vulnerability assessment and penetration testing exercises using wide variety of tools and techniques on different scenarios. 

During the training program, participants will be taken through the demonstration of modules starting from basic networking to report writing. 

On completion of this course, you will be able to successfully conduct Vulnerability Assessment / Penetration Testing exercise on real time networks in organizations.

This  course will be useful for almost computer engineers having basic knowledge of will anyway keep them aware with secure strategy irrespective of being in testing or in development. Specifically this program will be helpful to following genre of people:

  • Network Administrators
  • Penetration Testers
  • Networking Professionals
  • Aspirant Engineering Bachelors
We have some pre-requisite for this course. These are not mandatory but having them will certainly be a benefit for you.

  • Basic knowledge of OSI model
Introduction to Network VA/PT

  • Technical Foundation for Security Testing Standards
  • OSI Model
  • Fundamentals of different servers (DHCP, DNS, FTP, Web, etc.)

Reconnaissance

  • Whois
  • Archives
  • Google Dorks & Shodan
  • Enumeration
  • Maltego

Scanning

  • Types of Scans
  • Tool Availability
  • Scanning with Nmap
  • Using nmap scripts
  • Banner Grabbing
  • Advanced Scanning

Sniffers

  • Introduction
  • Active Sniffing
  • Passive Sniffing
  • Wireshark and Ethereal
  • Attacks on ARP
  • MITM
  • Session Hijacking
  • Replay Attack

Denial Of Service

  • Introduction
  • Types of DoS Attacks
  • Countermeasures

Wi-Fi Testing

  • Introduction
  • Wireless Technologies
  • Attacks on Wi-Fi infrastructure.
Vulnerability Assessment

  • Scoping
  • VA Tools
  • Scanner Configurations
  • Removing False Positives
  • VLAN vulnerability Assessment.

Exploitation

  • What to be performed
  • Tool Availability
  • Identifying Weakest Link and Potential Attack Vectors
  • Advanced Exploitation techniques
  • Using Social Engineering for Exploitation
  • Red Team Environment
  • Beef Exploitation Framework
  • Putting it altogether and Chaining attacks.

Metasploit

  • Metasploit: Auxiliary, Exploits, Payloads.
  • Metasploit Extensions
  • Mass Exploitation
  • Armitage

Post Exploitation

  • Meterpreter
  • Pass the Hash
  • Pivoting
  • Full Network Ownage
  • Case Studies

Covering your Traces

Anti-Cyber Forensics

Reporting

  • Tools for reporting
  • Automated Reporting
  • Manual Reporting
  • A proper Consultant Report Requirements.

DLP

$175

₹ 9,500
  • Slides Booklet
  • Tools/SW
  • Lab Booklet with Code Scripts
  • Class Room Demo
  • Hands On Training
  • Training Videos
  • Cloud Lab Access
  • Lifetime Support
  • Deliverable Via Post
  • 3 Months Access
$ 175

₹ 9,500

Online

$125

₹ 6,700
  • Slides Booklet
  • Tools/SW
  • Lab Booklet with Code Scripts
  • Class Room Demo
  • Hands On Training
  • Training Videos
  • Cloud Lab Access
  • Lifetime Support
  • Deliverable Via Downloads
  • 3 Months Access
$ 125

₹ 6,700

Virtual Class

$200

₹ 10,800
  • Slides Booklet
  • Tools/SW
  • Lab Booklet with Code Scripts
  • Class Room Demo
  • Hands On Training
  • Training Videos
  • Cloud Lab Access
  • Lifetime Support
  • Deliverable Via Downloads
  • 30 Hours Virtual Class
$ 200

₹ 10,800

Have a query?

You got any doubt, question, suggestion in mind? Contact us.

One of our team member will get back to you asap.

Would like to tell the world about this course? Why not share it?

 

 

 

Jay KumarNetwork Pentesting