Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

Ultimate Hacking

( Duration: 4 Days )

The Ultimate Hacking training course will provides skills to attack and defend networks and applications with new modules, exploits, and hacker techniques. In the hands-on classroom environment, you will learn step-by-step procedures for executing attacks, conducting penetration tests, and blocking attacks on the Internet, intranet networks, and host-level systems. By learning how to leverage these security techniques and methodologies, you can actively defend critical internal and external assets against malevolent threats.

By attending Ultimate Hacking workshop, delegates will learn:

  • How hackers and malicious intruders analyze and develop target vectors aimed at critical assets
  • The strategy behind finding weaknesses before they become a security risk
  • The proven McAfee Penetration Testing Methodology
  • Develop the mindset of a malicious attacker and identify the true risk to the organization
  • Use the tools and methodologies hackers use efficiently, in a controlled and safe environment
  • Develop own security toolkit from tried and tested tools

Basic UNIX and Windows competency and a basic understanding of security principles are recommended in order to achieve the greatest benefits from this course.

System and network administrators, security personnel, auditors, and/or consultants concerned with network and system security should attend this Ultimate Hacking class.

COURSE AGENDA

1

Footprinting

  • Determine the Scope
  • Proper Authorization
  • Publicly Available Information
  • WHOIS and DNS Enumeration
  • DNS Interrogation
  • Network Reconnaissance
2

Scanning

  • Host Discovery
  • Service Discovery
  • Operating System Detection
3

Enumeration

  • Banner Grabbing
  • Vulnerability Scanning
  • Metasploit
4

System Hacking (Windows)

  • Network Enumeration
  • Host Enumeration
  • Enumeration Countermeasures
  • Penetration
  • Penetration Countermeasures
  • Privilege Escalation
  • Privilege Escalation Countermeasures
  • Pillaging
  • Password cracking/recovery – John the Ripper, Cain & Abel, lcp, rainbow tables, etc.
  • Pillaging Countermeasures
  • Expanding
  • Expanding Influence Countermeasures
5

System Hacking (Unix)

  • Overview of UNIX/Linux
  • Enumeration
  • Enumeration Countermeasures
  • Penetration Countermeasures
  • Privilege Escalation Attacks
  • Privilege Escalation Countermeasures
  • Pillaging
  • Pillaging Countermeasures
  • Expanding Influence
  • Expanding Influence Countermeasures
6

Web Hacking

  • e-Commerce Architecture
  • HTTP/HTTPS Primer
  • Discovery
  • Configuration Management
  • Authentication
  • Authorization
  • Session Handling
  • Data Validation
  • OWASP Top 10

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X