• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

Network Hacking Training

Network Hacking Training

By Course Gate

5.0(1)
  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • On-Demand course

  • 5 hours 2 minutes

  • All levels

Description

The goal of this Network Hacking Training is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand. The course will give you step by step instructions for insulation VirtualBox and creating your virtual environment on Windows, Mac, and Linux. You will learn how to ethically hack, protect, test, and scan your own systems. You'll also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. 

By the end of this course, you will be familiar with how various types of wired and wireless network hacks are performed and you will be fully equipped to test and safegaurd a network infrastructure against various real time attack vectors.

Who is this course for?

Network Hacking Training is suitable for anyone who wants to gain extensive knowledge, potential experience, and professional skills in the related field. This course is CPD accredited so you don't have to worry about the quality.

Requirements

Our Network Hacking Training is open to all from all academic backgrounds and there are no specific requirements to attend this course. It is compatible and accessible from any device including Windows, Mac, Android, iOS, Tablets etc.

CPD Certificate from Course Gate 

At the successful completion of the course, you can obtain your CPD certificate from us. You can order the PDF certificate for £9 and the hard copy for £15. Also, you can order both PDF and hardcopy certificates for £22.

Career path

This course opens a new door for you to enter the relevant job market and also gives you the opportunity to acquire extensive knowledge along with required skills to become successful. You will be able to add our qualification to your CV/resume which will help you to stand out in the competitive job industry.


Course Curriculum

Introduction

Introduction

00:01:00

Introduction to Ethical Hacking. Footprinting and Reconnaissance

Introduction to Ethical Hacking. Footprinting and Reconnaissance

00:25:00

Demo - Information Gathering using Google Dorks and DNS Queris

00:04:00

Demo - Scanning and Enumeration

00:08:00

Scanning Networks, Enumeration and Discovering Vulnearbilities

Scanning and enumeration

00:09:00

Vulnerabilties Identification

00:08:00

Demo - Installing Nessus Scanner

00:03:00

Demo - Use Nessus to Discover Vulnerabilities

00:05:00

Demo - Using Nikto to discover Web Vulnerabilities

00:05:00

Demo - Using Paros for Vulnerability Discovery

00:05:00

Demo - Use Dirbuster to brute force sub-directories and filenames

00:03:00

System Hacking and Vulnerability Exploitation

System hacking - vulnerability exploitation

00:06:00

Passwords

00:12:00

Authentication

00:07:00

Basics of Sniffing

Sniffing

00:15:00

Metasploit

Metasploit

00:17:00

Demo - Exploiting FTP Server Vulnerability using Metasploit

00:12:00

Demo - Post Exploitation Example

00:01:00

Demo - Exploiting NFS Vulnerability and exporting SSH Keys to the

00:10:00

Demo - Eploiting Samba Service on Linux using Metasploit

00:03:00

Demo - Windows backdoor using Metasploit

00:14:00

Trojans, Backdoors, Viruses and Worms

Trojans and Backdoors

00:05:00

Computer viruses and worms

00:09:00

Cryptography

Cryptography concepts

00:05:00

Cryptographic Algorithms

00:11:00

Cryptography and cryptanalysis tools. Cryptography attacks

00:03:00

Demo - Hack SSH passwords using Medusa

00:05:00

Hack the SSH Password using Hydra

00:05:00

Hack Linux Passwords using John the Ripper

00:03:00

Penetration Testing on Wireless Networks

Penetration Testing on Wireless Networks

00:07:00

Case Study - Windows Hosted Network Bug or Feature

00:11:00

Penetration Testing Overview. Final words

Penetration Testing Overview. Final Words

00:06:00

Bonus - OWASP Top 10 Vulnerabilities

00:18:00

(Bonus) Attacking the users trough websites - XSS and Beef-XSS

Introduction to Cross-Site Scripting and Beef-XSS

00:08:00

XSS example - reflected

00:10:00

XSS example - stored

00:07:00

Beef-XSS Demo

00:16:00

Certificate and Transcript

Order Your Certificates or Transcripts

00:00:00

About The Provider

Course Gate
Course Gate
London
5.0(1)

Welcome to Course Gate, your gateway to a world of knowledge and oppo...

Read more about Course Gate

Tags

Reviews