Hacking & Penetration Test for IT Administrator



By TED Integrated
![]() |
![]() |
![]() |
![]() |
Hacking & Penetration Test for IT Administrator
Training Category:
Information Technology
Target Audience:
IT Administrator, System Engineers, Webmasters, CTOs, CIOs, IT heads and managers who are new to hacking and penetration test.
Duration:
2 Days
Jan 2019 ›
TED Learning Centre, Binjai 8 Premium SOHO, Kuala Lumpur, Malaysia
Schedule:
Thu 24 Jan 2019 - Fri 25 Jan 2019
9:00AM - 5:00PM
Fee Per Person:
RM3,500.00
Promotions:
- 10% discount per person for group registration of 5 paxs or more.
* Other terms & conditions apply.
![]() |
Request for Quotation |
![]() |
+603-2386-7788 |
![]() |
training@ted.com.my |
- Language: English
- PowerPoint Presentation
- Group Discussion
- Computer Lab Work
- Simulation
- Certificate of Participation
Course Introduction ›
This is a 2-Day Hacking & Penetration Test training for IT Administrator. It targets on those IT professionals who are new to hacking and penetration test. This program helps to keep those with little to no experience on hacking and penetration test up to speed with the tools and methods offered by the trainer.
To request for in-house training, click on the Request for In-house Training link as displayed above for quotation. For a complete course cotent and more information about this course, feel free to contact the training provider as shown above. If the public program is available, you can request for a registration online by clicking on the Register for Public Training link. If the link is disabled, it simply means it has yet to be available for public. You can contact the training provider for further inquiry.
Course Objectives ›
At the end of this workshop, participant should be able to understand the following:
- What is Penetration Testing?
- Reconnaissance
- Scanning
- Exploitation
- Social Engineering
- Web-Based Exploitation
- Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter
- Writing Penetration Testing Report
Course Outline ›
Module 1: What is Penetration Testing?
- Introduction to Kali 1.0.8 Linux
- Working with Your Attack Machine
- Hacking Lab
- Penetration Test Methodology
Module 2: Reconnaissance
- Website Copier
- Practicing Your Google-Fu
- Discovering and Leveraging E-mail Addresses
- Whois
- Netcraft
- Host
- Extracting Information from DNS
- Extracting Information From E-mail Servers
- MetaGooFil
- Attack of the Drones
- Social Engineering
- Sifting through the Intel to Finding Attackable Targets
Module 3: Scanning
- Pings and Ping Sweeps
- Port Scanning and Service Detection
- Vulnerability Scanning
Module 4: Exploitation
- Gaining Access to Remote Services
- Metasploit
- John the Ripper
- Password Resetting
- Sniffing Network Traffic
- Macof
- Armitage
Module 5: Social Engineering
- The Basics of SET
- Website Attack Vectors
- The Credential Harvester
Module 6: Web-Based Exploitation
- The Basics of Web Hacking
- Interrogating Web Servers
- Crawling Your Target's Website
- Intercepting Web Requests
- Code Injection Attacks
- Cross-Site Scripting: Browsers that Trust Sites
Module 7: Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter
- Netcat
- Cryptcat: Netcat's Cryptic Cousin
- Rootkits
- Hacker Defender
- Detecting and Defending Against Rootkits
- Meterpreter
Module 8: Wrapping Up the Penetration
- Writing the Penetration Testing Report
Contact us now ›
|
|
![]() |
![]() |