- TCP/IP Packet Analysis
- Overview of Network Security
- Port and Protocols & Analysis
- Linux Server Installation
- Windows Client / Linux Installation
- Basic commands (Windows / Linux)
- Kali Linux Installation
Network Penetration Testing Online Training Course
Join Network Penetration Testing Online Training Course by Infosec Train and detect exploitable vulnerabilities in ...Read more
Online
Quick Facts
particular | details | |||
---|---|---|---|---|
Medium of instructions
English
|
Mode of learning
Self study, Virtual Classroom
|
Mode of Delivery
Video and Text Based
|
Course overview
The Network Penetration Testing certification course from Infosec Train is designed to teach you all about ethical hacking or penetration testing from a networking perspective. You will learn the fundamentals of network-based ethical hacking. The training will prepare you to become a professional penetration tester.
This Network Penetration Testing online course helps you understand the exploitation techniques a hacker might employ on networks. Ultimately you will become an expert in identifying, exploiting, and securing various vulnerabilities in the network.
By completing the Network Penetration Testing Online Training Course, you will also get acquainted with networking tools like TCPDump or Wireshark and additional techniques. The programme is focused on making you adept at using the latest penetration tools to secure your client’s network.
Furthermore, this training aims to prepare you for various certifications, including Certified Penetration Tester (CPT), CompTIA Pentest+, Certified Ethical Hacker (CEH), and Certified Expert Penetration Tester (CEPT). The Network Penetration Testing programme includes 40 hours of instructor-led sessions, real-life scenarios to inculcate practical skills, and hands-on exposure to a wide range of vulnerabilities.
The highlights
- Certified mentors
- Real-life scenarios for practical learning
- Customised corporate learning
- 40 hours of instructor-led session
- One-to-one (personalised) training
- Hands-on exposure with vulnerabilities
- Certified Penetration Tester (CPT) (preparation)
- CompTIA Pentest+ (preparation)
- Certified Ethical Hacker (CEH) (preparation)
- Certified Expert Penetration Tester (CEPT) (preparation)
- Recorded sessions
- Demo class (free of cost)
Program offerings
- Certified mentors
- Customised corporate learning
- Recorded sessions
- Real-life scenarios for practical learning
- 40 hours of instructor-led sessions
- Hands-on exposure with vulnerabilities
- One-to-one (personalised) training
- Demo class (free of cost).
Course and certificate fees
certificate availability
Yes
certificate providing authority
Infosec Train
Who it is for
The Network Penetration Testing online programme is well-suited for:
- Penetration testers
- Professionals interested in learning about ethical hacking and penetration testing
- Cybersecurity consultants
- Security analysts
Eligibility criteria
The Network Penetration Testing training by Infosec Train requires knowledge of Windows OS and TCP/IP protocols. You should be able to handle Unix-based operating systems like Linux Operating System or others. You should also have experience using network reconnaissance and associated tools such as Nessus, Nmap, Netcat.
What you will learn
After you finish Infosec Train’s Network Penetration Testing Online Training Course syllabus, you will:
- Be prepared to score the following certifications, including Certified Penetration Tester (CPT), CompTIA Pentest+, Certified Ethical Hacker (CEH), and Certified Expert Penetration Tester (CEPT).
- Master the tools, methodologies, and manual hacking techniques deployed by ethical hackers or penetration testers.
- Add expertise to your professional skills as a professional security tester.
- Experience hands-on and applied hacking skills to counter hackers and secure the networks.
The syllabus
Introduction
Wireshark
- Introduction
- ICMP Packet Analysis
- ARP Packet Analysis
- 3 way handshake Analysis
- Tracert Command Analysis
- Packet Forensics
- Nmap Packet Forensics
NMAP Basics
- Network Sweeping
- OS Discovery
- SYN Scan
- UDP Scan
- XMAS Scan
- FIN Scan
- NULL Scan
Nmap Firewall Scan
- Fragment Scan
- Data Length Scan
- TTL Scan
- Source Port Scan
- Decoy Scan
- Spoof IP Scan
- Spoof MAC Scan
- Data String Scan
- Hex String Scan
- IP Options Scan
Metasploit
- Metasploit Basic
- Msfvenom
- Auxiliary scanner
- Windows Reverse TCP
- Windows HTTPS Tunnel
- Hidden Bind TCP
- Macro Payloads
- Shell on the Fly (Transport)
- Bypass User Access Control
- Pass the Hash
- Post Exploitation
Dictionary & Passwords Attacks
- Hydra
- Medussa
- Crunch
- CeWL
- WCE
- Mimikatz
- cUPP
- Online attacks
FTP Penetration Testing (Port 21)
- Introduction & Lab setup
- Banner Grabbing/Banner Hiding
- Port forwarding /Time Scheduling
- Brute forcing/Secure
- Pivoting/Tunneling [windows]
SSH Penetration Testing (Port 22)
- Introduction & Lab setup
- Banner Grabbing/Banner Hiding
- Port forwarding /Time Scheduling
- Brute forcing/Secure
- Pivoting/Tunneling
- Multiple way to secure ssh
Telnet Penetration Testing (Port 23)
- Introduction & Lab setup
- Banner Grabbing/Banner Hiding
- Port forwarding /Time Scheduling
- Brute forcing/Secure
- Pivoting/Tunneling
SMTP Penetration Testing (Port 25)
- Introduction & Lab setup
- Banner Grabbing/Banner Hiding
- Port forwarding /Time Scheduling
- Brute forcing/Secure
- Penetration testing with SWAKS
DNS & DHCP Penetration Testing (Port 53, 67, 68)
- Introduction and Lab setup
- DHCP Packet Analysis with Wireshark
- DNS Enumeration
- DHCP Starvation attack
- Tools (Gobbler, Yersinia, responder)
- Rogue DHCP Server
NetBIOS & SMB Penetration Testing (Port 135-445)
- Introduction & Lab setup
- SMB Enumeration
- SMB Null Sessions
- Enum4Linux
- NetBIOS Spoofing
- Banner Grabbing/Banner Hiding
- Brute forcing/Secure
- Pivoting/Tunneling
- Penetration Testing with (PS exec, eternal blue )
- Multiple way to connect smb
SNMP Penetration Testing (Port 161, 162)
- Introduction & Lab setup
- Banner Grabbing/Banner Hiding
- Port forwarding /Time Scheduling
- Brute forcing/Secure
- Penetration Testing with Metasploit and Nmap
MSSQL Penetration Testing (Port 1433)
- MSSQL Brute force Attack
- Enumerate MSSQL configuration setting
- Identifying SQL Server logins
- Identify Database owner
- Identify a User With masquerade privilege
- Execute SQL Statement
- Retrieve MSSQL Password Hashes of Users
- Decode Password Hashes of Users
- Extracting MYSQL Schema Information
MySQL Penetration Testing (Port 3306)
- Introduction and Lab setup
- MYSQL Brute Force Attack
- mysql banner user/file/ Enumeration
- Stealing MYSQL information
- Check File Privileges
- Enumerate MYSQL writeable directories
- Extract MYSQL Username with Hash Password
- Crack Hash Password with John the Ripper
- Secure MYSQL through port forwarding
- Prevent Mysql against brute force attack
Remote Desktop Penetration Testing (Port 3389)
- Introduction and Lab setup
- Port forwarding /Time Scheduling
- Banner Grabbing/Banner Hiding
- DOS Attack
- Pivoting/Tunneling
- Brute forcing/Secure
VNC Penetration Testing (Port 5900, 5901)
- Introduction & Lab setup
- Banner Grabbing/Banner Hiding
- Port forwarding /Time Scheduling
- Brute forcing/Secure
- Penetration Testing with Metasploit and Nmap
- Pivoting/Tunneling
Sniffing and Spoofing
- Introduction
- MAC Address Snooping
- ARP Poisoning
- DNS Poisoning
- DNS Spoofing
- Xerosploit
- Capture NTLM Hashes
Socks Proxy Penetration Testing
- SSH
- Socks proxy lab setup
- HTTP
- FTP
IDS, Firewall, Honeypots
- Setup Snort Lab in Ubuntu
- Understanding Snort Rules
- Introduction to IPtables
- Introduction to Windows Firewall
- ICMP Detect
- TCP Packet Detect
- Detect Nmap Scan
- Detect Dos Attack
- Antivirus Evasion with veil
DOS Attack Penetration Testing
- Introduction to DOS Attack
- Botnet
- D-DOS Attack
- SYN Flood Attack
- UDP Flood
- Smurf Attack
- Packet Crafting
- Others DOS Attack Tools
Social Engineering Attack
- Introduction to Social Engineering Attack
- Java Applet Attack
- Payload & Listener Attack
- MSFPC
- HTA Attack
- DOS Attack
- VNC Attack
- PowerShell Attack Vector
Covering Tracks and Maintaining access
- s4u_persistence
- Persistence
- Clear Event Logs
- VSS_Persistence
- Netcat
- Registry Persistence
Network Vulnerability Assessment Tool
- Nessus
- GFI Languard
- Nexpose
- Openvas
- MBSA
Admission details
- Visit the Network Penetration Testing Online Training Course page.
- Here, you can check course features, syllabus, demo class details, training calendar, learning modes, and more. Tap on ‘Enrol Now’.
- When the pop-up appears, provide name, email, training required (as a comment), phone no., and country name. If you are enrolling for the corporate version, put your company name and employee count as well.
Filling the form
Start your enrolment process in Infosec Train’s Network Penetration Testing certification course by filling in the data fields of a pop-up box. Include your name, email address, training required (as a comment), phone no., and country name. For proceeding with the corporate training option, furnish your company name and employee count as well.
How it helps
The Network Penetration Testing programme benefits include in-depth preparation for four certifications, including Certified Penetration Tester (CPT), CompTIA Pentest+, Certified Ethical Hacker (CEH), and Certified Expert Penetration Tester (CEPT). The certificate programme uses real-life scenarios and hands-on exposure with diverse vulnerabilities to make you industry-ready.
FAQs
Does the Network Penetration Testing Online Training Course have any prerequisites?
The programme entails an understanding of TCP/IP protocols and Windows OS. You should also know how to handle Unix-based operating systems such as Linux Operating System or others. You need experience in applying network reconnaissance and associated tools such as Nessus, Nmap, Netcat.
What certifications does the Network Penetration Testing certificate programme prepare me for?
Certified Penetration Tester (CPT), CompTIA Pentest+, Certified Ethical Hacker (CEH), and Certified Expert Penetration Tester (CEPT).
Is the Network Penetration Testing programme suitable for security analysts?
Yes. The course is best suited for security analysts, penetration testers, cybersecurity consultants, and those interested in exploring concepts of ethical hacking and penetration testing.
What learning modes are available?
One-to-one (personalised) training, corporate learning (customised), and online training are available.
How many hours of Network Penetration Testing training is accessible?
Instructor-led training of 40 hours is provided.