Penetration Testing and Ethical Hacking
Penetration Testing and Ethical Hacking

Penetration Testing and Ethical Hacking

Who should attend ?

IT Security Centre Personnel, Auditors, Cyber Security Experts, Site or System Managers.

Prerequisites

Basic knowledge of networks is a plus.

Course Syllabus

  • Introduction: Basic concepts, Pentest approaches, Planning, Reporting
  • Linux Basics
  • Network basics
  • Reconnaissance
    • Active/Passive information gathering
    • Using search engines & Google hacking
    • Footprinting
  • Web application pentests
    • Web technologies & standards
    • Personal proxy
    • Information gathering
    • Configuration management & flaws
    • Input/output manipulation
      • XSS (Cross Site Scripting)
      • SQL injection
    • Authentication flaws
      • Brute force & dictionary attacks
      • CAPTCHA & flaws
    • Authorization flaws
      • Privilege escalation
      • Path traversal
    • Session management flaws
      • Session fixation
      • CSRF (Cross Site Request Forgery)
    • Business logic flaws
  • Scanning networks
    • Host detection
    • Discovering network topology
  • Network layer (Layer 2) attacks
  • Vulnerability scanning
  • Exploit – Post Exploit
    • Exploit databases
    • Metasploit framework
    • Post exploitation
  • Pivoting and tunnelling
  • Social Engineering
    • Evading detection devices
    • Preparing custom payloads
    • Embedding malware into files
    • Social engineering attacks on Mobile devices
  • Persistency

Duration

5 Days.

Benefits

Attendees will be able to participate and contribute to penetration tests.

This website uses cookies to ensure you get the best experience on our website. Cookies Policy

GOT IT