Network Penetration Testing Online Training Course

BY
Infosec Train

Join Network Penetration Testing Online Training Course by Infosec Train and detect exploitable vulnerabilities in systems, networks, hosts and network devices.

Mode

Online

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study, Virtual Classroom
Mode of Delivery Video and Text Based

Course overview

The Network Penetration Testing certification course from Infosec Train is designed to teach you all about ethical hacking or penetration testing from a networking perspective. You will learn the fundamentals of network-based ethical hacking. The training will prepare you to become a professional penetration tester.

This Network Penetration Testing online course helps you understand the exploitation techniques a hacker might employ on networks. Ultimately you will become an expert in identifying, exploiting, and securing various vulnerabilities in the network.

By completing the Network Penetration Testing Online Training Course, you will also get acquainted with networking tools like TCPDump or Wireshark and additional techniques. The programme is focused on making you adept at using the latest penetration tools to secure your client’s network.

Furthermore, this training aims to prepare you for various certifications, including Certified Penetration Tester (CPT), CompTIA Pentest+, Certified Ethical Hacker (CEH), and Certified Expert Penetration Tester (CEPT). The Network Penetration Testing programme includes 40 hours of instructor-led sessions, real-life scenarios to inculcate practical skills, and hands-on exposure to a wide range of vulnerabilities.

The highlights

  • Certified mentors
  • Real-life scenarios for practical learning
  • Customised corporate learning
  • 40 hours of instructor-led session
  • One-to-one (personalised) training
  • Hands-on exposure with vulnerabilities
  • Certified Penetration Tester (CPT) (preparation)
  • CompTIA Pentest+ (preparation)
  • Certified Ethical Hacker (CEH) (preparation)
  •  Certified Expert Penetration Tester (CEPT) (preparation)
  • Recorded sessions
  • Demo class (free of cost)

Program offerings

  • Certified mentors
  • Customised corporate learning
  • Recorded sessions
  • Real-life scenarios for practical learning
  • 40 hours of instructor-led sessions
  • Hands-on exposure with vulnerabilities
  • One-to-one (personalised) training
  • Demo class (free of cost)

Course and certificate fees

certificate availability

Yes

certificate providing authority

Infosec Train

Who it is for

The Network Penetration Testing online programme is well-suited for:

  • Penetration testers
  • Professionals interested in learning about ethical hacking and penetration testing
  • Cybersecurity consultants
  • Security analysts

Eligibility criteria

The Network Penetration Testing training by Infosec Train requires knowledge of Windows OS and TCP/IP protocols. You should be able to handle Unix-based operating systems like Linux Operating System or others. You should also have experience using network reconnaissance and associated tools such as Nessus, Nmap, Netcat.

What you will learn

Knowledge of hacking concepts

After you finish Infosec Train’s Network Penetration Testing Online Training Course syllabus, you will: 

  • Be prepared to score the following certifications, including Certified Penetration Tester (CPT), CompTIA Pentest+, Certified Ethical Hacker (CEH), and Certified Expert Penetration Tester (CEPT).
  • Master the tools, methodologies, and manual hacking techniques deployed by ethical hackers or penetration testers.
  • Add expertise to your professional skills as a professional security tester.
  • Experience hands-on and applied hacking skills to counter hackers and secure the networks.

The syllabus

Module 1

Introduction
  • Overview of Network Security
  • TCP/IP Packet Analysis
  • Linux Server Installation
  • Port and Protocols and Analysis
  • Basic commands (Windows / Linux)
  • Windows Client / Linux Installation
  • Kali Linux Installation

Module 2

Wireshark
  • Introduction
  • Packet Forensics
  • ARP Packet Analysis
  • ICMP Packet Analysis
  • Nmap Packet Forensics
  • Tracert Command Analysis
  • 3-way handshake Analysis

Module 3

Network Sweeping
  • NMAP Basics
  • FIN Scan
  • SYN Scan
  • OS Discovery
  • NULL Scan
  • XMAS Scan
  • UDP Scan

Module 4

Nmap Firewall Scan
  • Data Length Scan
  • Source Port Scan
  • Spoof IP Scan
  • Decoy Scan
  • Data String Scan
  • TTL Scan
  • Spoof MAC Scan
  • Fragment Scan
  • IP Options Scan
  • Hex String Scan

Module 5

Metasploit
  • Msfvenom
  • Metasploit Basic
  • Shell on the Fly (Transport)
  • Windows Reverse TCP
  • Auxiliary scanner
  • Hidden Bind TCP
  • Windows HTTPS Tunnel
  • Post Exploitation
  • Bypass User Access Control
  • Pass the Hash
  • Macro Payloads

Module 6

Dictionary and Passwords Attacks
  • Medussa
  • Hydra
  • WCE
  • Crunch
  • Mimikatz
  • CeWL
  • Online attacks
  • cUPP

Module 7

FTP Penetration Testing (Port 21) Introduction and Lab setup
  • Port forwarding /Time Scheduling
  • Banner Grabbing/Banner Hiding
  • Pivoting/Tunneling [windows]
  • Brute forcing/Secure

Module 8

SSH Penetration Testing (Port 22)
  • Introduction and Lab setup
  • Port forwarding /Time Scheduling
  • Banner Grabbing/Banner Hiding
  • Brute forcing/Secure
  • Multiple-way to secure ssh
  • Pivoting/Tunneling

Module 9

Telnet Penetration Testing (Port 23)
  • Introduction and Lab setup
  • Port forwarding /Time Scheduling
  • Banner Grabbing/Banner Hiding
  • Pivoting/Tunneling
  • Brute forcing/Secure

Module 10

SMTP Penetration Testing (Port 25)
  • Introduction and Lab setup
  • Brute forcing/Secure
  • Port forwarding /Time Scheduling
  • Banner Grabbing/Banner Hiding
  • Penetration testing with SWAKS

Module 11

DNS and DHCP Penetration Testing (Port 53, 67, 68)
  • Introduction and Lab setup
  • DHCP Packet Analysis with Wireshark
  • DNS Enumeration
  • DHCP Starvation attack
  • Tools (Gobbler, Yersinia, responder)
  • Rogue DHCP Server

Module 12

NetBIOS and SMB Penetration Testing (Port 135-445)
  • Introduction and Lab setup
  • SMB Null Sessions
  • SMB Enumeration
  • NetBIOS Spoofing
  • Enum4Linux
  • Banner Grabbing/Banner Hiding
  • Pivoting/Tunneling
  • Brute forcing/Secure
  • Multiple-way to connect smb
  • Penetration Testing with (PS exec, eternal blue)

Module 13

SNMP Penetration Testing (Port 161, 162)
  • Introduction and Lab setup
  • Port forwarding /Time Scheduling
  • Banner Grabbing/Banner Hiding
  • Penetration Testing with Metasploit and Nmap
  • Brute forcing/Secure

Module 14

MSSQL Penetration Testing (Port 1433)
  • Enumerate MSSQL configuration setting
  • MSSQL Brute force Attack
  • Identify Database owner
  • Identifying SQL Server logins
  • Identify users with masquerade privilege
  • Retrieve MSSQL Password Hashes of Users
  • Execute SQL Statement
  • Extracting MYSQL Schema Information
  • Decode Password Hashes of Users

Module 15

MySQL Penetration Testing (Port 3306)
  • Introduction & Lab setup
  • mysql banner user/file/ Enumeration
  • MYSQL Brute Force Attack
  • Check File Privileges
  • Stealing MYSQL information
  • Prevent Mysql against brute force attack
  • Enumerate MYSQL writeable directories
  • Crack Hash Password with John the Ripper
  • Extract MYSQL Username with Hash Password
  • Secure MYSQL through port forwarding

Module 16

Remote Desktop Penetration Testing (Port 3389)
  • Introduction and Lab setup
  • Port forwarding /Time Scheduling
  • Banner Grabbing/Banner Hiding
  • DOS Attack
  • Pivoting/Tunneling
  • Brute forcing/Secure

Module 17

VNC Penetration Testing (Port 5900, 5901)
  • Introduction and Lab setup
  • Port forwarding /Time Scheduling
  • Banner Grabbing/Banner Hiding
  • Penetration Testing with Metasploit & Nmap
  • Brute forcing/Secure
  • Pivoting/Tunneling

Module 18

Sniffing and Spoofing
  • Introduction
  • MAC Address Snooping
  • ARP Poisoning
  • DNS Poisoning
  • DNS Spoofing
  • Xerosploit
  • Capture NTLM Hashes

Module 19

Socks Proxy Penetration Testing
  • SSH
  • Socks proxy lab setup
  • HTTP
  • FTP

Module 20

IDS, Firewall, Honeypots
  • Understanding Snort Rules
  • Setup Snort Lab in Ubuntu
  • ICMP Detect
  • Detect Dos Attack
  • Introduction to Windows Firewall
  • Introduction to IPtables
  • Detect Nmap Scan
  • TCP Packet Detect
  • Antivirus Evasion with veil

Module 21

DOS Attack Penetration Testing
  • Introduction to DOS Attack
  • D-DOS Attack
  • Botnet
  • SYN Flood Attack
  • Smurf Attack
  • UDP Flood
  • Others DOS Attack Tools
  • Packet Crafting

Module 22

Social Engineering Attack
  • Introduction to Social Engineering Attack
  • Java Applet Attack
  • Payload & Listener Attack
  • MSFPC
  • HTA Attack
  • DOS Attack
  • VNC Attack
  • PowerShell Attack Vector

Module 23

Covering Tracks and Maintaining access
  • s4u_persistence
  • Persistence
  • Clear Event Logs
  • VSS_Persistence
  • Netcat
  • Registry Persistence

Module 24

Network Vulnerability Assessment Tool
  • GFI Languard
  • Nessus
  • Openvas
  • Nexpose
  • MBSA

Admission details

  • Visit the Network Penetration Testing Online Training Course page.  
  • Here, you can check course features, syllabus, demo class details, training calendar, learning modes, and more. Tap on ‘Enrol Now’. 
  • When the pop-up appears, provide name, email, training required (as a comment), phone no., and country name. If you are enrolling for the corporate version, put your company name and employee count as well. 

Filling the form

Start your enrolment process in Infosec Train’s Network Penetration Testing certification course by filling in the data fields of a pop-up box. Include your name, email address, training required (as a comment), phone no., and country name. For proceeding with the corporate training option, furnish your company name and employee count as well.

How it helps

The Network Penetration Testing programme benefits include in-depth preparation for four certifications, including Certified Penetration Tester (CPT), CompTIA Pentest+, Certified Ethical Hacker (CEH), and Certified Expert Penetration Tester (CEPT). The certificate programme uses real-life scenarios and hands-on exposure with diverse vulnerabilities to make you industry-ready.

FAQs

Does the Network Penetration Testing Online Training Course have any prerequisites?

The programme entails an understanding of TCP/IP protocols and Windows OS. You should also know how to handle Unix-based operating systems such as Linux Operating System or others. You need experience in applying network reconnaissance and associated tools such as Nessus, Nmap, Netcat. 

What certifications does the Network Penetration Testing certificate programme prepare me for?

Certified Penetration Tester (CPT), CompTIA Pentest+, Certified Ethical Hacker (CEH), and Certified Expert Penetration Tester (CEPT). 

Is the Network Penetration Testing programme suitable for security analysts?

Yes. The course is best suited for security analysts, penetration testers, cybersecurity consultants, and those interested in exploring concepts of ethical hacking and penetration testing.

What learning modes are available?

One-to-one (personalised) training, corporate learning (customised), and online training are available.

How many hours of Network Penetration Testing training is accessible?

Instructor-led training of 40 hours is provided. 

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books