About the course
This 1-day course will teach you the foundations of Pen Testing and how to find and exploit vulnerabilities within different technologies. This introductory course will train attendees in understanding Pen Testing, and provide background information on risks and vulnerabilities associated with different systems and provide insight to how the mindset of a hacker works. Delegates will also get access to an online course environment platform which will be used to practice the concepts taught during the course.
Attendees will gain understanding in the following topics:
- Understand different network topologies and addressing schemes
- Understand the properties and security of common network protocols and the network protocol stacks.
- How to fingerprint, enumerate and exploit common windows and linux misconfigurations and vulnerabilities.
- Differentiate between types of wireless standards and understand the benefits and risks associated with these standards.
- How to exploit common web application security flaws.
Hacking History 101
Hacking in 2018
Art of Hacking Methodology
Introduction to Kali Linux
MAC Addressing and Network Addressing
Introduction to Port Addressing
Understanding the OSI Layer and TCP/IP Model
Domain Name System (DNS) Attack Surface
TCP vs UDP
Introduction to Linux
Linux Filesystem Hierarchy
Linux File Permissions
Berkeley Rsh/Rlogin Services
Network File System (NFS) Security
Missing Security Patches
Case Study: Shellshock
Introduction to Metasploit
Windows Password Hashing
Workgroups vs Domains
Windows Exploitation 101
Case Study: WannaCry
Hacking CMS Software
Introduction to Content Management Systems
Enumerating CMS Platforms
HTTP Protocol Basics
Understanding Web Application Attack Surface
Case Study: T alkT alk SQL Injection
Cross-Site Scripting (XSS)
WiFi Security 101
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Setup (WPS) flaws
Rogue Access Points Attacks
Who Should Take This Class?
System Administrators, Web Developers, IT Managers, Security enthusiasts, anyone interested in Pen Testing and ethical hacking. (No prior experience is required to take this course)