Lesson 1: Introduction to Network Security
Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
Lesson 2: Pentration Testing Lab Setup
According to the configuration of Laptop, 32/64 bit, provide VMware, and any Penetration testing OS like Kali/Backbox, Windows XP SP2, Windows 7 Install VMware, OSs on it using Bridge Connection
Lesson 3: Deep Information Gathering
Active Information Gathering in depth.
Passive Information Gathering in depth.
Scanning target using nmap advanced features.
Lesson 4: Getting into System
Exploiting Windows and Linux System
Application of Metasploit
Creating malicious files (standalone binaries) using msfvenom
Attack through browser
Bruteforcing on Ports
Exploiting using different File Format
Social-Engineer Toolkit (SET)
Lesson 5: Sniffing & MITM
Studying ARP, how it works and how it can be manipulated to mount sophisticated attacks is made extremely easy to understand. Sniffing is a technique that you will be able to fully grasp in its most practical aspects. We will make sure you have enough basics of network theory before we cover actual attack scenarios using the best tools available. Man in the middle attacks are one of the most used penetration testing techniques today; you will be able to mount man in the middle attacks within local networks and over the Internet.
Lesson 6: Post Exploitation
ICSS experienced instructors have come up with a proven methodology to conduct thorough Exploitation of remote internal networks through advanced Post exploitation techniques. Once the student is comfortable with most recent exploitation techniques, he will be exposed to the cyclic steps of a successful Post exploitation phase. This is the phase where criminals ensure stable high privileged access to the remote network in order to steal and ex-filtrate documents and credentials from the organization. Penetration testers must possess the same skill-set and tools in order to test not only the perimeter security but also any kind of internal weakness that affects the organization security.
Lesson 7: Anonymity
Penetration testers rarely need to cover their tracks. However there are times when testing the efficiency of the target organization incident response team is within the scope of a Penetration tester’s engagement.
Lesson 8: Social Engineering
Social engineering module will guide you through the most modern social engineering attack techniques. Real world attacks will be illustrated by exploiting the potential of social networks such as Facebook, Spokeo or Twitter. Almost one hour of video lessons will teach you everything you need to know to master the most important tool in the field: Social Engineering Toolkit.
Lesson 9: Pentesting With Metasploit
In this module, the student will study the Metasploit architecture and the framework, and will learn how to create, add or edit custom Metasploit modules. Thanks to our virtual labs, the student will also have the chance to practice against real vulnerable machines.
Lesson 10: Traffic Analysis
After the target network has been identified, the next step is to configure our tools in order to sniff and intercept the traffic. This is a very important step for all the attacks that come here after.
Lesson 11: Attacking Wi-Fi Network
The following module focuses on the attacks that can be executed on Wi-Fi networks. The student will learn how to attack and access remote Wi-Fi networks, obtain keys, password and much more, according to their configuration and security mechanism. We will first start exploring the attacks against WEP and then focus our tests on more secure networks: WPA, WPA2 and WPS.
Lesson 12: Wi-Fi as an attack Vector
In the last module, of the Wi-Fi section, the student will learn how to use Wi-Fi as an attack vector. This means that we will not attack Wi-Fi networks, instead we will use Wi-Fi in order to create fake networks, obtain credentials, run MitM attacks and much more.
Why Choose National institute of Cyber Security ?
Certified ethical hacking professional course is the most popular cyber security and ethical hacking training in India. The ethicalhacking course goes in depth into the techniques used by Black Hat hackers and demonstrates it live in a lab based 100% practical oriented class. As these hacking skills can be used in a bad way, our ethical hacking course will teach you how you can use the same skills to protect the intellectual property of organizations and individuals and become a white hat hacker. During the course of ethical hacking you will develop the ability to measure and mitigate threats and find out where your organization is more vulnerable to be hacked.
The prime objective of this course is to make you ready for the industry where you can use your skills to protect the organization. After completion of this course you will be able to successfully document Vulnerability Assessment report for the organization
Reported Critical Vulnerabilities in
1. Liferay Portal India Website
2. Oxford University Website
4. Harvard University
6. Flock messenger
7. Avalara information security
8. Peter Luk
Closely associated with government agencies and state police for assisting them in cyber crime cases.
Advantages of our course: (online )
1. LIVE practical classes conducted by industry professionals from all over World.
2. Classes will be recorded every day and will be available in our cloud drive where you can access it life long through your registered gmail account
3. Certificate from “National institute of Cyber Security ” recognized by all organizations including government
4. Life time access to “HACKERS LAB” online portal containing Video Tutorials, Assignments, Case Studies
5. If you score more than A+ in you certificate you will be offered a gold membership card of our Research&Devlopment Team
6. 100% Money refund if you are not satisfied within 5 classes.
Company Name: National institute of Cyber Security
You can go for the online classes.
If you are interested please let us know. We will send you the invoice where you can transfer the amount and we can start the classes
Please feel free to contact for any further Clarifications.
National institute of Cyber Security
Contact : 91- 9780030498 / 6297730297
E-Mail: [email protected]
If you Want to E.M.I payment Method ..
then contact us to make sure your training…