Advanced Penetration Testing (Corporate Only)

Overview 

Advance Penetration training (using Backtrack / Kali Linux) helps students in developing core skills in vulnerability assessment and penetration testing of network systems.

This training program will be focused on Backtrack – which is an exceptionally popular and helpful platform for pen testing. Back Track allows ethical hackers to execute high end security checks on the system.

Course Objectives

  • Advanced Scanning methods
  • Attacking from the Web
  • Client Side Pen-testing
  • Attacking from the LAN
  • Breaking out of Restricted Environments
  • Bypassing Network-Based IDS/IPS
  • Privilege Escalation
  • Post-Exploitation

Eligibility Requirement

Participants are required to have the following knowledge –

  • Fundamental knowledge of Unix/Linux is essential
  • Understanding of software installation and configuring services in Linux/Unix
  • Excellent knowledge of common network and security services is necessary

[Course Outline

  • Introduction to Backtrack/Kali
    • Installing Backtrack/Kali
    • Configure Network Connection
    • Using Backtrack/Kali
    • Update Backtrack/Kali
  • Penetration Testing Standard
    • Open Source Security Testing Methodology Manual (OSSTMM)
    • Information Systems Security Assessment Framework (ISSAF)
    • Open Web Application Security Project (OWASP)
    • Licensee Penetration Testing (LPT)
  • Penetration Testing Classification
    • White Box and Black Box
    • Penetration Testing vs Vulnerability Assessment
  • Advance Penetration Methodology
  • Target Framework and Scope
    • Gathering client requirements
    • Test plan checklist
    • Profiling test boundaries
  • Information Discovery
    • Document Information
    • Search Engine
    • DNS Information Gathering
    • Whois Information Gathering
    • Route and Network information Gathering
  • Scanning Target
    • Advance Network Scanning
    • Port Scanning
  • Udp and port Scanning
  • Nmap Scanning and Plug-ins
    • Banner Identification and OS Identification
  • Active and passive
  • Enumerating Banners and System OS
    • Vulnerability Assessment Tools for System
  • Nessus
  • Open Vas
    • Enumerating Target
  • Target Exploitation
    • Exploitation with Metasploit
    • Working with Meterpreter Session
    • VNC Exploitation
  • Privileges Escalation
    • Breaking Password
  • John and hydra and some other online and offline tool
    • Metasploit with Database
  • Maintaining Access
    • Protocol tunneling
    • Proxy
    • Installing Backdoor
  • Document Management and Reporting
    • Documentation and results verification
    • Dradis Framework
    • Magic Tree and Maltego
  • Advance Sniffing
    • ARP Poisoning
    • DNS Poisoning redirecting user to fake website
    • SSL Striping
    • Packet Capturing and Analysis and Gathering information
  • DOS Attack
    • Syn Attack
    • Application Service Flood Attack
  • Web Penetration Testing
    • Introduction to Web Application Vulnerabilities
    • Web Application Assessment and Exploitation with automation Tools
  • Wireless Penetration Testing
    • Introduction to Wireless Security
    • Breaking Wireless Network
    • Configure Fake Access Point
  • Exploits and Client Side Attack
    • Buffer overflows—A refresher
    • Introduction to fuzzing
    • Fuzzing tools included in BackTrack
    • Fast-Track
    • Social Engineering Toolkit
  • Firewall Testing
    • Introduction to Firewall
    • Testing Firewall
      • Testing Firewall Rules
      • Testing Ports
  • Data Collection, Evidence Management and Reporting
    • Type of Report
    • Presentation Report
    • Post Testing Procedure

Live Virtual Class Info

This course can be delivered in live virtual classroom mode, where,  you do not have to travel miles to take up this courses as we bring learning at your fingertips

Cognitel’s easy-to-use interactive online platform provides access to students and professionals to engage in courses, delivered by our experienced subject matter expert, from comforts of their home, office or on mobile devices.

In Live Virtual Classroom training, there is provision of :

    1. One to One Training (Personalized) :

  • The start date can be scheduled depending on the participant’s convenience.
  • 5 classes @ 4 hours per day
  • Training Time:
    • 1900 hours to 2300 hours (Indian Standard Time)
    • 1330 hours to 1730 hours (Greenwich Mean Time)

    2. Group Training  :

  • Minimum batch size: 5 (to initiate a batch)
  • 5 classes @ 4 hours per day
  • Training Time:
    • 1900 hours to 2300 hours (Indian Standard Time)
    • 1330 hours to 1730 hours (Greenwich Mean Time)

ENQUIRE ABOUT THIS COURSE


    Reviews

    There are no reviews yet.

    Be the first to review “Advanced Penetration Testing (Corporate Only)”

    Your email address will not be published. Required fields are marked *