Course Summary

If you are looking to build your hacking skills, either for working as a pen tester, or you need to understand how hackers work so that you are better able to defend against it, then this course is the best place to start. It will create confidence and increase your knowledge. You will take these skills and techniques away with you for working on a day to day basis.

Trained delegates can:

• Understand and demonstrate the fundamentals of penetration testing best practice.
• Understand how to tie security testing and other offensive and defensive measures back to authentic attack vectors.
• Use OSINT techniques to enumerate external assets and information about your organisation that could be used to plan a cyberattack.
• Use a range of techniques to identify vulnerabilities in Windows and Linux.
• Understand and explain how security approaches differ by operating system.
• Identify web application and Content Management System (CMS) vulnerabilities.

HACKING FUNDAMENTALS
• Hacking History 101
• Hacking in the modern era
• CIA Triad
• Art of Hacking Methodology
• Introduction to Kali Linux

WINDOWS SECURITY
• Windows Fundamentals
• Windows Password Hashing
• Workgroups vs Domains
• Windows Authentication
• Windows Exploitation 101
• Client-Side attacks
• Case Study: WannaCry

HACKING CMS SOFTWARE
• Introduction to Content Management Systems
• Enumerating CMS Platforms
• Hacking WordPress
• Joomla Exploitation

NETWORK SECURITY
• Network Fundamentals
• MAC Addressing and Network Addressing
• Introduction to Port Addressing
• Understanding the OSI Layer and TCP/IP Model
• Domain Name System (DNS) Attack Surface
• TCP vs UDP
• Network Scanning
• Shodan

LINUX SECURITY
• Introduction to Linux
• Linux Filesystem Hierarchy
• Linux File Permissions
• Berkeley Rsh/Rlogin Services
• Network File System (NFS) Security
• Missing Security Patches
• Vulnerability Identification
• Case Study: Shellshock
• Introduction to Metasploit

WEB SECURITY
• HTTP Protocol Basics
• Understanding Web Application Attack Surface
• SQL Injection
• Case Study: TalkTalk SQL Injection
• Command Injection
• Cross-Site Scripting (XSS)
• Open Redirect

WIRELESS SECURITY
• WiFi Security 101
• Wired Equivalent Privacy (WEP)
• Wi-Fi Protected Access (WPA)
• WPA2 Security
• Wi-Fi Protected Setup (WPS) flaws
• Rogue Access Points Attacks

There is no prerequisite for taking this course.

Upon successful completion of the course, delegates will receive a certificate of completion, acknowledging their proficiency in the subject matter.

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?