The goal of this Network Hacking Training is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand. The course will give you step by step instructions for insulation VirtualBox and creating your virtual environment on Windows, Mac, and Linux. You will learn how to ethically hack, protect, test, and scan your own systems. You’ll also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
By the end of this course, you will be familiar with how various types of wired and wireless network hacks are performed and you will be fully equipped to test and safegaurd a network infrastructure against various real time attack vectors.
Who is this course for?
Network Hacking Training is suitable for anyone who wants to gain extensive knowledge, potential experience, and professional skills in the related field. This course is CPD accredited so you don’t have to worry about the quality.
Our Network Hacking Training is open to all from all academic backgrounds and there are no specific requirements to attend this course. It is compatible and accessible from any device including Windows, Mac, Android, iOS, Tablets etc.
CPD Certificate from Course Gate
At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £4.99 and the hard copy for £9.99. Also, you can order both PDF and hardcopy certificates for £12.99.
This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry.
|Introduction to Ethical Hacking. Footprinting and Reconnaissance|
|Introduction to Ethical Hacking. Footprinting and Reconnaissance||00:25:00|
|Demo – Information Gathering using Google Dorks and DNS Queris||00:04:00|
|Demo – Scanning and Enumeration||00:08:00|
|Scanning Networks, Enumeration and Discovering Vulnearbilities|
|Scanning and enumeration||00:09:00|
|Demo – Installing Nessus Scanner||00:03:00|
|Demo – Use Nessus to Discover Vulnerabilities||00:05:00|
|Demo – Using Nikto to discover Web Vulnerabilities||00:05:00|
|Demo – Using Paros for Vulnerability Discovery||00:05:00|
|Demo – Use Dirbuster to brute force sub-directories and filenames||00:03:00|
|System Hacking and Vulnerability Exploitation|
|System hacking – vulnerability exploitation||00:06:00|
|Basics of Sniffing|
|Demo – Exploiting FTP Server Vulnerability using Metasploit||00:12:00|
|Demo – Post Exploitation Example||00:01:00|
|Demo – Exploiting NFS Vulnerability and exporting SSH Keys to the||00:10:00|
|Demo – Eploiting Samba Service on Linux using Metasploit||00:03:00|
|Demo – Windows backdoor using Metasploit||00:14:00|
|Trojans, Backdoors, Viruses and Worms|
|Trojans and Backdoors||00:05:00|
|Computer viruses and worms||00:09:00|
|Cryptography and cryptanalysis tools. Cryptography attacks||00:03:00|
|Demo – Hack SSH passwords using Medusa||00:05:00|
|Hack the SSH Password using Hydra||00:05:00|
|Hack Linux Passwords using John the Ripper||00:03:00|
|Penetration Testing on Wireless Networks|
|Penetration Testing on Wireless Networks||00:07:00|
|Case Study – Windows Hosted Network Bug or Feature||00:11:00|
|Penetration Testing Overview. Final words|
|Penetration Testing Overview. Final Words||00:06:00|
|Bonus – OWASP Top 10 Vulnerabilities||00:18:00|
|(Bonus) Attacking the users trough websites - XSS and Beef-XSS|
|Introduction to Cross-Site Scripting and Beef-XSS||00:08:00|
|XSS example – reflected||00:10:00|
|XSS example – stored||00:07:00|