Sale!

Network Penetration testing

 25,000.00  22,000.00

Duration 40 hours – 2 classes per week
Online Live traning
1. LIVE practical classes conducted by industry professionals from all over World.
2. Classes will be recorded every day and will be available in our cloud drive where you can access it life long through your registered gmail account
3. Certificate from “National institute of Cyber Security ” recognized by all organizations including government
4. Life time access to “HACKERS LAB” online portal containing Video Tutorials, Assignments, Case Studies

Category:

Description

Lesson 1:  Introduction to Network Security

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Lesson 2:  Pentration Testing Lab Setup

According to the configuration of Laptop, 32/64 bit, provide VMware, and any Penetration testing OS like Kali/Backbox, Windows XP SP2, Windows 7 Install VMware, OSs on it using Bridge Connection

Lesson 3: Deep Information Gathering

Active Information Gathering in depth.

    Passive Information Gathering in depth.

    Scanning target using nmap advanced features.

    Vulnerability Scanning.

Lesson 4: Getting into System

    Exploiting Windows and Linux System

    Application of Metasploit

    Creating malicious files (standalone binaries) using msfvenom

    Attack through browser

    Evading Antivirus

    Bruteforcing on Ports

    Exploiting using different File Format

    Social-Engineer Toolkit (SET)

Lesson 5: Sniffing & MITM

Studying ARP, how it works and how it can be manipulated to mount sophisticated attacks is made extremely easy to understand. Sniffing is a technique that you will be able to fully grasp in its most practical aspects. We will make sure you have enough basics of network theory before we cover actual attack scenarios using the best tools available. Man in the middle attacks are one of the most used penetration testing techniques today; you will be able to mount man in the middle attacks within local networks and over the Internet.

Lesson 6: Post Exploitation

ICSS experienced instructors have come up with a proven methodology to conduct thorough Exploitation of remote internal networks through advanced Post exploitation techniques. Once the student is comfortable with most recent exploitation techniques, he will be exposed to the cyclic steps of a successful Post exploitation phase. This is the phase where criminals ensure stable high privileged access to the remote network in order to steal and ex-filtrate documents and credentials from the organization. Penetration testers must possess the same skill-set and tools in order to test not only the perimeter security but also any kind of internal weakness that affects the organization security.

Lesson 7: Anonymity

Penetration testers rarely need to cover their tracks. However there are times when testing the efficiency of the target organization incident response team is within the scope of a Penetration tester’s engagement.

Lesson 8: Social Engineering

Social engineering module will guide you through the most modern social engineering attack techniques. Real world attacks will be illustrated by exploiting the potential of social networks such as Facebook, Spokeo or Twitter. Almost one hour of video lessons will teach you everything you need to know to master the most important tool in the field: Social Engineering Toolkit.

Lesson 9: Pentesting With Metasploit

In this module, the student will study the Metasploit architecture and the framework, and will learn how to create, add or edit custom Metasploit modules. Thanks to our virtual labs, the student will also have the chance to practice against real vulnerable machines.

Lesson 10: Traffic Analysis

After the target network has been identified, the next step is to configure our tools in order to sniff and intercept the traffic. This is a very important step for all the attacks that come here after.

Lesson 11: Attacking Wi-Fi Network

The following module focuses on the attacks that can be executed on Wi-Fi networks. The student will learn how to attack and access remote Wi-Fi networks, obtain keys, password and much more, according to their configuration and security mechanism. We will first start exploring the attacks against WEP and then focus our tests on more secure networks: WPA, WPA2 and WPS.

Lesson 12: Wi-Fi as an attack Vector

In the last module, of the Wi-Fi section, the student will learn how to use Wi-Fi as an attack vector. This means that we will not attack Wi-Fi networks, instead we will use Wi-Fi in order to create fake networks, obtain credentials, run MitM attacks and much more.

Why Choose National institute of Cyber Security ?

Certified ethical hacking professional course is the most popular cyber security and ethical hacking training in India. The ethicalhacking course goes in depth into the techniques used by Black Hat hackers and demonstrates it live in a lab based 100% practical oriented class. As these hacking skills can be used in a bad way, our ethical hacking course will teach you how you can use the same skills to protect the intellectual property of organizations and individuals and become a white hat hacker. During the course of ethical hacking you will develop the ability to measure and mitigate threats and find out where your organization is more vulnerable to be hacked.
The prime objective of this course is to make you ready for the industry where you can use your skills to protect the organization. After completion of this course you will be able to successfully document Vulnerability Assessment report for the organization

Our Credentials:

Reported Critical Vulnerabilities in

1. Liferay Portal India Website
2. Oxford University Website
3. Hotstar
4. Harvard University
5. Ucall
6. Flock messenger
7. Avalara information security
8. Peter Luk

Closely associated with government agencies and state police for assisting them in cyber crime cases.

Advantages of our course: (online )

1. LIVE practical classes conducted by industry professionals from all over World.

2. Classes will be recorded every day and will be available in our cloud drive where you can access it life long through your registered gmail account

3. Certificate from “National institute of Cyber Security ” recognized by all organizations including government

4. Life time access to “HACKERS LAB” online portal containing Video Tutorials, Assignments, Case Studies

5. If you score more than A+ in you certificate you will be offered a gold membership card of our Research&Devlopment Team

6. 100% Money refund if you are not satisfied within 5 classes.

Company Name: National institute of Cyber Security

You can go for the online classes.

​If you are interested please let us know. We will send you the invoice where you can transfer the amount and we can start the classes

Please feel free to contact for any further Clarifications.

National institute of Cyber Security
​www.nic-security.com​

Fb: www.facebook.com/nicsec.official

​​Contact : 91- 9780030498 / 6297730297
E-Mail: [email protected]

If you Want to E.M.I payment Method .. 

then contact us to make sure your training…

our mail is [email protected] or [email protected]

Reviews

There are no reviews yet.

Be the first to review “Network Penetration testing”

Your email address will not be published. Required fields are marked *