Network Penetration Testing Online Training Course

BY
Infosec Train

Join Network Penetration Testing Online Training Course by Infosec Train and detect exploitable vulnerabilities in systems, networks, hosts and network devices.

Mode

Online

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study, Virtual Classroom
Mode of Delivery Video and Text Based

Course overview

The Network Penetration Testing certification course from Infosec Train is designed to teach you all about ethical hacking or penetration testing from a networking perspective. You will learn the fundamentals of network-based ethical hacking. The training will prepare you to become a professional penetration tester.

This Network Penetration Testing online course helps you understand the exploitation techniques a hacker might employ on networks. Ultimately you will become an expert in identifying, exploiting, and securing various vulnerabilities in the network.

By completing the Network Penetration Testing Online Training Course, you will also get acquainted with networking tools like TCPDump or Wireshark and additional techniques. The programme is focused on making you adept at using the latest penetration tools to secure your client’s network.

Furthermore, this training aims to prepare you for various certifications, including Certified Penetration Tester (CPT), CompTIA Pentest+, Certified Ethical Hacker (CEH), and Certified Expert Penetration Tester (CEPT). The Network Penetration Testing programme includes 40 hours of instructor-led sessions, real-life scenarios to inculcate practical skills, and hands-on exposure to a wide range of vulnerabilities.

The highlights

  • Certified mentors
  • Real-life scenarios for practical learning
  • Customised corporate learning
  • 40 hours of instructor-led session
  • One-to-one (personalised) training
  • Hands-on exposure with vulnerabilities
  • Certified Penetration Tester (CPT) (preparation)
  • CompTIA Pentest+ (preparation)
  • Certified Ethical Hacker (CEH) (preparation)
  •  Certified Expert Penetration Tester (CEPT) (preparation)
  • Recorded sessions
  • Demo class (free of cost)

Program offerings

  • Certified mentors
  • Customised corporate learning
  • Recorded sessions
  • Real-life scenarios for practical learning
  • 40 hours of instructor-led sessions
  • Hands-on exposure with vulnerabilities
  • One-to-one (personalised) training
  • Demo class (free of cost).

Course and certificate fees

certificate availability

Yes

certificate providing authority

Infosec Train

Who it is for

The Network Penetration Testing online programme is well-suited for:

  • Penetration testers
  • Professionals interested in learning about ethical hacking and penetration testing
  • Cybersecurity consultants
  • Security analysts

Eligibility criteria

The Network Penetration Testing training by Infosec Train requires knowledge of Windows OS and TCP/IP protocols. You should be able to handle Unix-based operating systems like Linux Operating System or others. You should also have experience using network reconnaissance and associated tools such as Nessus, Nmap, Netcat.

What you will learn

Knowledge of hacking concepts

After you finish Infosec Train’s Network Penetration Testing Online Training Course syllabus, you will: 

  • Be prepared to score the following certifications, including Certified Penetration Tester (CPT), CompTIA Pentest+, Certified Ethical Hacker (CEH), and Certified Expert Penetration Tester (CEPT).
  • Master the tools, methodologies, and manual hacking techniques deployed by ethical hackers or penetration testers.
  • Add expertise to your professional skills as a professional security tester.
  • Experience hands-on and applied hacking skills to counter hackers and secure the networks.

The syllabus

Introduction

  • TCP/IP Packet Analysis
  • Overview of Network Security
  • Port and Protocols & Analysis
  • Linux Server Installation
  • Windows Client / Linux Installation
  • Basic commands (Windows / Linux)
  • Kali Linux Installation

Wireshark

  • Introduction
  • ICMP Packet Analysis
  • ARP Packet Analysis
  • 3 way handshake Analysis
  • Tracert Command Analysis
  • Packet Forensics
  • Nmap Packet Forensics

NMAP Basics

  • Network Sweeping
  • OS Discovery
  • SYN Scan
  • UDP Scan
  • XMAS Scan
  • FIN Scan
  • NULL Scan

Nmap Firewall Scan

  • Fragment Scan
  • Data Length Scan
  • TTL Scan
  • Source Port Scan
  • Decoy Scan
  • Spoof IP Scan
  • Spoof MAC Scan
  • Data String Scan
  • Hex String Scan
  • IP Options Scan

Metasploit

  • Metasploit Basic
  • Msfvenom
  • Auxiliary scanner
  • Windows Reverse TCP
  • Windows HTTPS Tunnel
  • Hidden Bind TCP
  • Macro Payloads
  • Shell on the Fly (Transport)
  • Bypass User Access Control
  • Pass the Hash
  • Post Exploitation

Dictionary & Passwords Attacks

  • Hydra
  • Medussa
  • Crunch
  • CeWL
  • WCE
  • Mimikatz
  • cUPP
  • Online attacks

FTP Penetration Testing (Port 21)

  • Introduction & Lab setup
  • Banner Grabbing/Banner Hiding
  • Port forwarding /Time Scheduling
  • Brute forcing/Secure
  • Pivoting/Tunneling [windows]

SSH Penetration Testing (Port 22)

  • Introduction & Lab setup
  • Banner Grabbing/Banner Hiding
  • Port forwarding /Time Scheduling
  • Brute forcing/Secure
  • Pivoting/Tunneling
  • Multiple way to secure ssh

Telnet Penetration Testing (Port 23)

  • Introduction & Lab setup
  • Banner Grabbing/Banner Hiding
  • Port forwarding /Time Scheduling
  • Brute forcing/Secure
  • Pivoting/Tunneling

SMTP Penetration Testing (Port 25)

  • Introduction & Lab setup
  • Banner Grabbing/Banner Hiding
  • Port forwarding /Time Scheduling
  • Brute forcing/Secure
  • Penetration testing with SWAKS

DNS & DHCP Penetration Testing (Port 53, 67, 68)

  • Introduction and Lab setup
  • DHCP Packet Analysis with Wireshark
  • DNS Enumeration
  • DHCP Starvation attack
  • Tools (Gobbler, Yersinia, responder)
  • Rogue DHCP Server

NetBIOS & SMB Penetration Testing (Port 135-445)

  • Introduction & Lab setup
  • SMB Enumeration
  • SMB Null Sessions
  • Enum4Linux
  • NetBIOS Spoofing
  • Banner Grabbing/Banner Hiding
  • Brute forcing/Secure
  • Pivoting/Tunneling
  • Penetration Testing with (PS exec, eternal blue )
  • Multiple way to connect smb

SNMP Penetration Testing (Port 161, 162)

  • Introduction & Lab setup
  • Banner Grabbing/Banner Hiding
  • Port forwarding /Time Scheduling
  • Brute forcing/Secure
  • Penetration Testing with Metasploit and Nmap

MSSQL Penetration Testing (Port 1433)

  • MSSQL Brute force Attack
  • Enumerate MSSQL configuration setting
  • Identifying SQL Server logins
  • Identify Database owner
  • Identify a User With masquerade privilege
  • Execute SQL Statement
  • Retrieve MSSQL Password Hashes of Users
  • Decode Password Hashes of Users
  • Extracting MYSQL Schema Information

MySQL Penetration Testing (Port 3306)

  • Introduction and Lab setup
  • MYSQL Brute Force Attack
  • mysql banner user/file/ Enumeration
  • Stealing MYSQL information
  • Check File Privileges
  • Enumerate MYSQL writeable directories
  • Extract MYSQL Username with Hash Password
  • Crack Hash Password with John the Ripper
  • Secure MYSQL through port forwarding
  • Prevent Mysql against brute force attack

Remote Desktop Penetration Testing (Port 3389)

  • Introduction and Lab setup
  • Port forwarding /Time Scheduling
  • Banner Grabbing/Banner Hiding
  • DOS Attack
  • Pivoting/Tunneling
  • Brute forcing/Secure

VNC Penetration Testing (Port 5900, 5901)

  • Introduction & Lab setup
  • Banner Grabbing/Banner Hiding
  • Port forwarding /Time Scheduling
  • Brute forcing/Secure
  • Penetration Testing with Metasploit and Nmap
  • Pivoting/Tunneling

Sniffing and Spoofing

  • Introduction
  • MAC Address Snooping
  • ARP Poisoning
  • DNS Poisoning
  • DNS Spoofing
  • Xerosploit
  • Capture NTLM Hashes

Socks Proxy Penetration Testing

  • SSH
  • Socks proxy lab setup
  • HTTP
  • FTP

IDS, Firewall, Honeypots

  • Setup Snort Lab in Ubuntu
  • Understanding Snort Rules
  • Introduction to IPtables
  • Introduction to Windows Firewall
  • ICMP Detect
  • TCP Packet Detect
  • Detect Nmap Scan
  • Detect Dos Attack
  • Antivirus Evasion with veil

DOS Attack Penetration Testing

  • Introduction to DOS Attack
  • Botnet
  • D-DOS Attack
  • SYN Flood Attack
  • UDP Flood
  • Smurf Attack
  • Packet Crafting
  • Others DOS Attack Tools

Social Engineering Attack

  • Introduction to Social Engineering Attack
  • Java Applet Attack
  • Payload & Listener Attack
  • MSFPC
  • HTA Attack
  • DOS Attack
  • VNC Attack
  • PowerShell Attack Vector

Covering Tracks and Maintaining access

  • s4u_persistence
  • Persistence
  • Clear Event Logs
  • VSS_Persistence
  • Netcat
  • Registry Persistence

Network Vulnerability Assessment Tool

  • Nessus
  • GFI Languard
  • Nexpose
  • Openvas
  • MBSA

Admission details

  • Visit the Network Penetration Testing Online Training Course page.  
  • Here, you can check course features, syllabus, demo class details, training calendar, learning modes, and more. Tap on ‘Enrol Now’. 
  • When the pop-up appears, provide name, email, training required (as a comment), phone no., and country name. If you are enrolling for the corporate version, put your company name and employee count as well. 

Filling the form

Start your enrolment process in Infosec Train’s Network Penetration Testing certification course by filling in the data fields of a pop-up box. Include your name, email address, training required (as a comment), phone no., and country name. For proceeding with the corporate training option, furnish your company name and employee count as well.

How it helps

The Network Penetration Testing programme benefits include in-depth preparation for four certifications, including Certified Penetration Tester (CPT), CompTIA Pentest+, Certified Ethical Hacker (CEH), and Certified Expert Penetration Tester (CEPT). The certificate programme uses real-life scenarios and hands-on exposure with diverse vulnerabilities to make you industry-ready.

FAQs

Does the Network Penetration Testing Online Training Course have any prerequisites?

The programme entails an understanding of TCP/IP protocols and Windows OS. You should also know how to handle Unix-based operating systems such as Linux Operating System or others. You need experience in applying network reconnaissance and associated tools such as Nessus, Nmap, Netcat. 

What certifications does the Network Penetration Testing certificate programme prepare me for?

Certified Penetration Tester (CPT), CompTIA Pentest+, Certified Ethical Hacker (CEH), and Certified Expert Penetration Tester (CEPT). 

Is the Network Penetration Testing programme suitable for security analysts?

Yes. The course is best suited for security analysts, penetration testers, cybersecurity consultants, and those interested in exploring concepts of ethical hacking and penetration testing.

What learning modes are available?

One-to-one (personalised) training, corporate learning (customised), and online training are available.

How many hours of Network Penetration Testing training is accessible?

Instructor-led training of 40 hours is provided. 

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books