HANDS-ON PENETRATION TESTING AND ETHICAL HACKING

Provided by

Enquire about this course

About the course

Who Should Attend?

IT Security Centre Personnel, Auditors, Cyber Security Experts, Site or System Managers.

Prerequisites

Course Syllabus

• Introduction: Basic concepts, Pentest approaches, Planning, Reporting
• Linux Basics
• Network basics
• Reconnaissance
- Active/Passive information gathering
- Using search engines & Google hacking
- Footprinting
• Web application pentests
- Web technologies & standards
- Personal proxy
- Information gathering
- Configuration management & flaws
- Input/output manipulation
 XSS (Cross Site Scripting)
 SQL injection
- Authentication flaws
 Brute force & dictionary attacks
 CAPTCHA & flaws
- Authorization flaws
 Privilege escalation
 Path traversal
- Session management flaws
 Session fixation
§ CSRF (Cross Site Request Forgery)
- Business logic flaws
• Scanning networks
- Host detection
- Discovering network topology
• Network layer (Layer 2) attacks
• Vulnerability scanning
• Exploit – Post Exploit
- Exploit databases
27
- Metasploit framework
- Post exploitation
• Pivoting and tunnelling
• Social Engineering
- Evading detection devices
- Preparing custom payloads
- Embedding malware into files
- Social engineering attacks on Mobile devices
• Persistency
Benefits
Attendees will be able to participate and contribute to penetration tests.

Enquire

Start date Location / delivery
No fixed date Distance learning Book now

Related article

Five great careers in Cyber Security Cyber security is one of the fastest developing industries in the world. The number of cyber-attacks rises yea...