Hacking & Penetration Test Training

Hacking & Penetration Test Training Hacking & Penetration Test Training
By TED Integrated
System Security:

Hacking & Penetration Test for IT Administrator

“Aimed at people who are new to the world of hacking and penetration testing...”

By TED Integrated


PSMB Certified Training Provider
Request for In-house TrainingRequest for In-house Training
Register for Public Training Public program not yet available
Email Customer Service [email protected] Contact Customer Service +603-2386-7788
Course Title:
Hacking & Penetration Test for IT Administrator
Training Category:
Information Technology
Target Audience:
IT Administrator, System Engineers, Webmasters, CTOs, CIOs, IT heads and managers who are new to hacking and penetration test.
Duration:
2 Days
Public Training Events
Jan 2019 ›
Venue:
TED Learning Centre, Binjai 8 Premium SOHO, Kuala Lumpur, Malaysia
Schedule:
Thu 24 Jan 2019 - Fri 25 Jan 2019
9:00AM - 5:00PM

Fee Per Person:
RM3,500.00
Promotions:
  • 10% discount per person for group registration of 5 paxs or more.
Register Now!

* Other terms & conditions apply.
For In-house Training
Request for Quotation Request for Quotation
For Other Inquiries
Contact TED Integrated
Contact customer service +603-2386-7788
Email customer service [email protected]
Delivery Methods
  • Language: English
  • PowerPoint Presentation
  • Group Discussion
  • Computer Lab Work
  • Simulation
  • Certificate of Participation
Ad by Google
*Terms & Conditions

Course Introduction ›

This is a 2-Day Hacking & Penetration Test training for IT Administrator. It targets on those IT professionals who are new to hacking and penetration test. This program helps to keep those with little to no experience on hacking and penetration test up to speed with the tools and methods offered by the trainer.

To request for in-house training, click on the Request for In-house Training link as displayed above for quotation. For a complete course cotent and more information about this course, feel free to contact the training provider as shown above. If the public program is available, you can request for a registration online by clicking on the Register for Public Training link. If the link is disabled, it simply means it has yet to be available for public. You can contact the training provider for further inquiry.

Course Objectives ›

At the end of this workshop, participant should be able to understand the following:

  • What is Penetration Testing?
  • Reconnaissance
  • Scanning
  • Exploitation
  • Social Engineering
  • Web-Based Exploitation
  • Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter
  • Writing Penetration Testing Report

Course Outline ›

DAY 1

Module 1: What is Penetration Testing?

  • Introduction to Kali 1.0.8 Linux
  • Working with Your Attack Machine
  • Hacking Lab
  • Penetration Test Methodology

Module 2: Reconnaissance

  • Website Copier
  • Practicing Your Google-Fu
  • Discovering and Leveraging E-mail Addresses
  • Whois
  • Netcraft
  • Host
  • Extracting Information from DNS
  • Extracting Information From E-mail Servers
  • MetaGooFil
  • Attack of the Drones
  • Social Engineering
  • Sifting through the Intel to Finding Attackable Targets

Module 3: Scanning

  • Pings and Ping Sweeps
  • Port Scanning and Service Detection
  • Vulnerability Scanning

Module 4: Exploitation

  • Gaining Access to Remote Services
  • Metasploit
  • John the Ripper
  • Password Resetting
  • Sniffing Network Traffic
  • Macof
  • Armitage
DAY 2

Module 5: Social Engineering

  • The Basics of SET
  • Website Attack Vectors
  • The Credential Harvester

Module 6: Web-Based Exploitation

  • The Basics of Web Hacking
  • Interrogating Web Servers
  • Crawling Your Target's Website
  • Intercepting Web Requests
  • Code Injection Attacks
  • Cross-Site Scripting: Browsers that Trust Sites

Module 7: Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter

  • Netcat
  • Cryptcat: Netcat's Cryptic Cousin
  • Rootkits
  • Hacker Defender
  • Detecting and Defending Against Rootkits
  • Meterpreter

Module 8: Wrapping Up the Penetration

  • Writing the Penetration Testing Report

Contact us now ›

  • Course content customization
  • In-house training request
  • Available public program
  • Consultation services
  • Other inquiries
Contact Customer ServiceCall : +603-2386-7788
Email Customer Service E-mail : [email protected]

Related Courses ›

Published by: ,