You will learn hacking tools, methodologies and techniques. This is a both practical and theatrical step-by-step course.
In order to protect yourself from hackers, you must think as one.
This training is based on a practical approach of day-by-day situations and it contain labs based on real environments. For the labs, target virtual machines are provided. There are over 17 exercises within the labs.
The course objective is to help you learn to master the (ethical) hacking techniques and methodology that are used in penetration systems. The course is designed for IT passionate, network and system engineers, security officers.
Below are the main topics, both theoretical and practical, of this course:
Chapter 1: Introduction to Ethical Hacking, Footprinting and Reconnaissance
Chapter 2: Scanning Networks, Enumeration and Vulnerabilities
Chapter 3: System Hacking
Chapter 4: Sniffing
Chapter 5: Metasploit
Chapter 6: Trojans, Backdoors, Viruses and Worms
Chapter 7: Cryptography
Chapter 8: Penetration testing on Wireless Networks
Chapter 9: Penetration Testing