Step by Step Network Infrastructure Hacking

You will learn hacking tools, methodologies and techniques. This is a both practical and theatrical step-by-step course.

In order to protect yourself from hackers, you must think as one.

This training is based on a practical approach of day-by-day situations and it contain labs based on real environments. For the labs, target virtual machines are provided. There are over 17 exercises within the labs.

The course objective is to help you learn to master the (ethical) hacking techniques and methodology that are used in penetration systems. The course is designed for IT passionate, network and system engineers, security officers.

Below are the main topics, both theoretical and practical, of this course:

Chapter 1: Introduction to Ethical Hacking, Footprinting and Reconnaissance

Chapter 2: Scanning Networks, Enumeration and Vulnerabilities

Chapter 3: System Hacking

Chapter 4: Sniffing

Chapter 5: Metasploit

Chapter 6: Trojans, Backdoors, Viruses and Worms

Chapter 7: Cryptography

Chapter 8: Penetration testing on Wireless Networks

Chapter 9: Penetration Testing

Introduction to Ethical Hacking. Footprinting and Reconnaissance
Information Gathering
Scanning and enumeration
Vulnerabilties Identification
Vulnerability discovery
System hacking - vulnerability exploitation
Vulnerability Exploitation using Metasploit
Trojans and Backdoors
Computer viruses and worms
Cryptography concepts
Cryptographic Algorithms
Cryptography and cryptanalysis tools. Cryptography attacks
Passwords Protection
Penetration Testing on Wireless Networks
WiFi Networks Security - practical approach
Case Study – Windows Hosted Network Bug or Feature
Penetration Testing Overview. Final Words

What's included

  • 16 Video Lessons
  • 5 Text Lessons

  • Works on all devices
  • Certificate of completion

Gabriel Avramescu