Network Pentest

In an organization’s infrastructure, the network can be considered as one of the most crucial components and hence makes it more vulnerable to a multitude of cyber-attacks. Network penetration testing is one of the most efficient methods in weeding out any loopholes and underlying vulnerabilities in the network before it is compromised and can be exploited, by performing attacks on the organization’s network infrastructure. Conducting a network pentest also enables the enterprise to develop the appropriate mitigation and recovery strategies.

Prerequisites

One should be familiar with the basic concepts of ethical hacking & Basic of Networking concept.

Course Content

Module 1: Introduction Network Security

Module 2: Penetration Testing Framework Kali Linux

Module 3: Wireshark

Module 4: Tshark

Module 5: NMAP Basics with Wireshark

Module 6: Nmap Firewall Scan

Module 7: Metasploit

Module 8: Dictionary & Passwords Attacks

Module 9: FTP Penetration Testing

Module 10: SSH Penetration Testing

Module 11: Telnet Penetration Testing

Module 12: SMTP Penetration Testing

Module 13: DNS & DHCP Penetration Testing

Module 14: MySQL Penetration Testing

Module 15: Remote Desktop Penetration Testing

Module 16: VNC Penetration Testing

Module 17: Sniffing & Spoofing

Module 18: Credential Dumping

Module 19: Socks Proxy Penetration Testing

Module 20: IDS, Firewall, Honeypots

Module 21: DOS Attack Penetration Testing

Module 22: Covering Tracks & Maintaining Access

Module 23: Network Vulnerability Assessment Tool

 Why choose this course?

  • This course has been designed for beginners & professionals who are looking to shift their career in the field of cybersecurity.
  • It covers both operational and technical aspects that can help the candidate to carry out a significant role in their organization as a network security auditor or a network penetration tester.

Contact us: http://bit.ly/ignitetechnologies