In an organization’s infrastructure, the network can be considered as one of the most crucial components and hence makes it more vulnerable to a multitude of cyber-attacks. Network penetration testing is one of the most efficient methods in weeding out any loopholes and underlying vulnerabilities in the network before it is compromised and can be exploited, by performing attacks on the organization’s network infrastructure. Conducting a network pentest also enables the enterprise to develop the appropriate mitigation and recovery strategies.
One should be familiar with the basic concepts of ethical hacking & Basic of Networking concept.
Module 1: Introduction Network Security
Module 2: Penetration Testing Framework Kali Linux
Module 3: Wireshark
Module 4: Tshark
Module 5: NMAP Basics with Wireshark
Module 6: Nmap Firewall Scan
Module 7: Metasploit
Module 8: Dictionary & Passwords Attacks
Module 9: FTP Penetration Testing
Module 10: SSH Penetration Testing
Module 11: Telnet Penetration Testing
Module 12: SMTP Penetration Testing
Module 13: DNS & DHCP Penetration Testing
Module 14: MySQL Penetration Testing
Module 15: Remote Desktop Penetration Testing
Module 16: VNC Penetration Testing
Module 17: Sniffing & Spoofing
Module 18: Credential Dumping
Module 19: Socks Proxy Penetration Testing
Module 20: IDS, Firewall, Honeypots
Module 21: DOS Attack Penetration Testing
Module 22: Covering Tracks & Maintaining Access
Module 23: Network Vulnerability Assessment Tool
Why choose this course?
- This course has been designed for beginners & professionals who are looking to shift their career in the field of cybersecurity.
- It covers both operational and technical aspects that can help the candidate to carry out a significant role in their organization as a network security auditor or a network penetration tester.
Contact us: http://bit.ly/ignitetechnologies