Duration

30 Hours(For Regular Course)

4-8 Hours(For Capsule Course)


Enroll Now

Request more information




Network Penetration Testing and Ethical Hacking

This web-based training course on Network Penetration Testing and Ethical Hacking functionality, administration and development, is available online to all individuals, institutions, corporates and enterprises in India (New Delhi NCR, Bangalore, Chennai, Kolkatta), US, UK, Canada, Australia, Singapore, United Arab Emirates (UAE), China and South Africa. No matter where you are located, you can enroll for any training with us - because all our training sessions are delivered online by live instructors using interactive, intensive learning methods.

Network penetration testing involves the methods and processes of conducting in-depth and deep rooted penetration tests in network systems and further finding vulnerabilities. It also involves mitigation methods and techniques of eliminating threats. As a penetration tester, professionals have the job of assessing the various vulnerabilities and loopholes in an organizations network and system security. A penetration tester prepares the network and the system for probable outside attacks by assessing the system through attacking it him/herself. A number of end-to-end penetration testing techniques, knowledge, tools and principles are involved in exploiting vulnerabilities in target networks.


This comprehensive network penetration testing and ethical hacking online course provides the trainees with the methods and means of properly planning, scoping and recon attacks. Additionally, the various methods of scanning, exploitation of targets, password attacks and manipulating web applications are taught. Our network penetration testing online training explores the detailed reconnaissance methods of mining blogs, search engines, social networking sites and various other world-wide and local networks. The various pen test tools that are useful for conducting penetration tests will also be taught about with examples. We will focus on real time measurement and assessment of risks and vulnerabilities in the business and system models. The course will help you structure real world attacks which will be beneficial in understanding the defense mechanism and its properties in detail. This network penetration testing course has no pre-requisites and can be taken up by any professional or beginner willing to work in the domain.


Planning Scoping And Reconnaissance

  • Building A Pen Test Infrastructure
  • Effective Pen Test Scopes And Engagement Rules
  • Using Latest Tools For Detailed Recon
  • Pen Test Reporting For Maximizing Impact
  • Mining Of Search Engine Results
  • Extraction And Analysis Of Document Metadata

In-Depth Scanning

  • Using Nmap
  • OS Fingerprinting
  • Version Scanning
  • The Use Of Scapy Packet Manipulation Suite
  • Nmap Scripting Engine Usage
  • The Nessus Vulnerability Scanner Application
  • User Accounts Enumeration
  • Netcat For Pen Tester
  • Scanning Tips
  • Tcpdump For Pen Testing
  • Nmap Scripting Engine
  • Version Scanning Using Nmap
  • Vulnerability Scanning Using Nessus
  • False-Positive Reduction
  • Packet Manipulation With Scapy
  • Enumerating Users
  • Netcat For The Pen Tester
  • Monitoring Services During A Scan

Exploitation

  • Attacking Client-Side Using Metasploit
  • Exploiting Network Services And Using The Meterpreter
  • Evading Anti-Viruses Using Veil Framework
  • Metasploit Databases And Integration Of Tools
  • Shell Versus Terminal Access
  • Pivoting Relays
  • Metasploit Coverage Using Exploits, Stagers And Stages
  • Strategies And Tactics For Evading Anti-Viruses
  • Analyzing Meterpreter
  • Implementation Of Port Forwarding Relays
  • Using Shell Access Of Target Environment

Post-Exploitation And Merciless Pivoting

  • Windows Command Line Working
  • Malicious Services
  • WMIC Toolset Usage
  • Post-Exploitation With Powershell
  • Password Guessing Using THC-Hydra
  • Metasploit Psexec
  • Hash Dumping
  • Metasploit Pivoting
  • Mimikatz Kiwi To Harvest Credentials
  • Command Line Kung Fu For Penetration Testing
  • Post-Exploitation With Powershell
  • Password Attack
  • Account Lockout And Avoidance Strategies
  • Automated Password Harvesting Using THC-Hydra
  • Retrieval And Manipulation Of Hashes
  • Pivoting In Target Environments
  • Harvesting Hashes And Passwords From Memory Using Mimikatz Kiwi

In-Depth Password Attacks And Web App Pen Testing

  • Custom Compiling And Leveraging John The Ripper To Crack Passwords
  • Sniffing Windows NTLM Authentication And Cracking It With Cain
  • Rainbow Table Attacks With Ophcrack
  • Pass-The-Hash Attacks With Metasploit And The Meterpreter
  • Scanning Web Servers With Nikto
  • Using The ZAP Proxy To Manipulate Custom Web Applications
  • Exploiting Cross-Site Request Forgery Vulnerabilities
  • Attacking Cross-Site Scripting Flaws
  • Leveraging Command Injection Flaws
  • Exploiting SQL Injection Flaws To Gain Shell Access Of Web Targets
  • Password Harvesting Using John The Ripper
  • Sniffing Using Cain
  • Cracking Windows Authentication Exchanges With Cain
  • Rainbow Tables For Maximizing Effectiveness
  • Pass-The-Hash Using Metasploit
  • Seeking And Using Cross-Site Scripting
  • Request Forgery In Cross Site
  • SQL Injection
  • Using SQL Injection For Performing Command Injection
  • Maximizing Effectiveness In Command Injection Testing

Network penetration testing is a highly sought after expertise with its application in virtually all industries and all domains in which organizations work over networks which are open to internal or outside attacks. Considering the importance and gravity of how important security measures are in any organization, the professionals who are experts in the domain are high in demand. On completing this network penetration testing certification course, trainees can expect to find job and career prospects in all major networking organizations and also work as freelance consultants providing network security services. The course is highly recommended for security professionals and network administrators of all sorts.

1. Are lab-sessions available after theory sessions?

We provide online lab facilities to all our students, wherever possible & applicable, using a combination of one or more options, including global ASP setups, live-environments, real-time simulations, training-videos, PPTs, Screenshots and others.

2. Who and how qualified are the instructors?

All our instructors go through a rigorous and multiple processes of filtering and selection before they are appointed by us. Only the most qualified, most experienced and best suited candidates are chosen as instructors.

3.What are the machine requirements for the course?

You must have a fairly good desktop PC or laptop. You can even access these courses on your tabs or smart phones. For PCs and laptops the configuration should be at-least an Intel Pentium processor, 4GB of RAM and 50 to 100 GB of free hard disk space. You must also have a good and steady WiFi internet connection which works at 3G or 4G speeds.

4.How will I undergo practical training in the course?

Depending on the type of lab facilities available for the course you have enrolled in for our instructor would be happy to help you in your lab sessions.

5.What is the process to get my questions/queries answered?

Get in touch with your trainer. You can also consult your batch-mates. We believe in collaborative and practical learning.

6.Can a free demo session be provided?

We do not provide free demo sessions.

7.Will there be a provision for repetition if I miss a class?

We encourage our trainees to attend all sessions. If you have missed a session we will try out best to update you on it, if possible. Else you will need to pay a small fee to have a repeat session arranged specifically for you.

8.Does your organization provide assistance in job hunting?

We are connected across the industry in India and abroad. We will pass on any job openings from our customer to our trainees. But we are not a manpower placement provider.

9.How and where can I make the payment?

You can pay using any credit or debit card in India or abroad. You can also pay using your PayPal account.

10. Will practice material or tests be also provided with the course?

Yes. As required & as applicable.

11.What is the minimum or maximum batch size?

Minimum/maximum batch sizes vary from course to course, depending upon a number of factors. It can vary from as few as 2 to as many as a few hundred, in some cases. But that number does not impact the quality of training that we deliver due to our tight quality-control mechanisms.

All trainees will be provided with a course participation and completion certificate by Aurelius Corporate Solutions. Please note, we are an independent provider of learning solutions. We are not affiliated in any manner to any company or organization.

Copyright © 2016 Aurelius Corporate Solutions Pvt. Ltd. All Rights Reserved.