Info@sytechlabs.com +91 8497953460/761
A GUIDE TO NETWORK PENTEST
Introduction to Penetration Testing
- What is Penetration Testing
- Basics of Penetration Testing
- Types of Penetration Testing
- Steps of Penetration Testing
- Goals to Achieve the Penetration Testing
- Methodologies of Penetration Testing
Working on Network Technologies
- Introduction to Networks (basics)
- Difference between OSI and TCP model
- IP addressing in depth
- Demo of Three Way Handshaking
- What is an IP?
- Types of Address
- Public IP address
- Private IP address
- Demos of Public and Private IP address
- Calculation of subnets/Subnet Mask
- Usage of Switches/ Routers/Hubs in practical scenarios
- Building up of Network Topologies
- Collisions and Broadcast Domains
Routers in Depth (Demos in Packet Tracer)
- What are Routers?
- Routing in details
- Tools for networking
- Static and Dynamic Routing
- OSPF (open shortest path first)
- RIP (Routing Information Protocol)
- EIGRP (Enhanced Interior gateway Routing Protocol)
Ports
- Introduction to Ports
- Working of Ports
- Types of Interfaces and ports
- Scanning of Ports (using Nmap and Nessus)
- Demo of Services running on ports
OS Hardening for Penetration Testing
- Introduction to LINUX
- Basic commands usage in LINUX
- Programming Basics in LINUX
- Cracking of roots in LINUX
- Difference between LINUX and windows
ARP (Address Resolution Protocol)
- Introduction to ARP
- Working of ARP
- Traffic Analysis (Using Wireshark)
- Introduction to Sniffing
- Demonstration
DOS AND DDOS
- Introduction to Denial of Service
- Introduction to Distributed Denial of Service
- Difference between both of them
- Practical Demonstration of DOS
- Practical Demonstration of DDOS
- IPSEC Policy
- Introduction to IPSEC
- Depth Study of IPSEC
- Creation of Policy to protect against DOS attacks
Intrusion Detection System
- Introduction to Intrusion Detection System
- Types of Intrusion detection System
- Working of Intrusion Detection System
- Practical Demonstration of Intrusion Detection System
- Generating Alerts even on PING attacks
- Track Down of Attacker
Advance Intrusion Detection System
- Introduction to AIDE
- Working of AIDE
- PGP and GPG Encryptions
- Demonstration of AIDE
- Detection of Added Trojans or viruses by attackers
- Audition of Any file
Switches in depth (Demos in packet tracer)
- Working of a Switch
- LAN Switching
- CSMA/CD
- VLANs (in depth)
- Introduction to VLAN’s
- Access Ports and Trunk Ports
- Configuring VLAN’s in Packet Tracer
- Native VLANs
- Inter-VLAN Routing
- Switch Security
- Port Security
- VTP(Virtual LAN Trunk Protocol)
- Working of VTP
- VTP modes
- Configuring of VTP
- STP (Spanning Tree Protocol)
- Working of STP
- Configuring of STP
- NAT (Network Address Translations)
- What is NAT?
- Real-time Scenarios of using NAT
- Types of NAT
- Configuring of Static NAT
- DHCP (Dynamic Host Configuration Protocol)
- Introduction to DHCP
- Configuring of DHCP
Cryptography
- Introduction to Cryptography
- Symmetric Key Cryptography
- Public Key Cryptography
- Methodologies of Cryptography
- Mono-alphabetic
- Ceaser-Cipher
- Advanced Ceaser Cipher
- Poly-alphabetic
- Vignere
- Auto-key
- Morse Code
- Transposition Cipher
- Rail-Fence Cipher
- Route-Cipher
- Cryptanalysis of Ciphers (Using Frequency Analysis)
- Fiestal Ciphers
- DES (Data Encryption Standards)
- Introduction to DES
- Working of DES
- Round Structure of DES
- Key Management Structure
- Demonstration of DES
- Double DES
- Meet In the Middle Attack
- AES (Advanced Encryption Standards)
- Introduction to AES
- Working of AES
- Round Structure of AES
- Key Management Structure
- Demonstration of AES
- Vulnerabilities of DES and AES
- Exploiting the vulnerabilities to AES and DES
- Hash Functions
- Introduction to Hash Functions
- SHA (Secured Hash Algorithms)
- MD5 (Message Detection Algorithms)
- Attacks on Hash Functions
Wireless Penetration Testing
- Introduction to Wireless
- Types of Wireless Networks
- Working of Wireless Networks
- Working of Frequencies
- Multiplexing
- Divisions of Multiple Access
- FDMA
- CDMA
- TDMA
- In depth Study of WEP/WPA/WPA2
- Handshaking of Open Authentication
- 3-way Handshaking of WEP
- 4-way Handshaking of WPA/WPA2
- Vulnerabilities of WEP/WPA/WPA2
- Exploitation of WEP/WPA/WPA2
Who should attend
- All students who use computers and Internet for their personal or academic work
- College students for Industrial training.
- Students from any stream can attend this training.
- Students who want to make their career in Information Security and Ethical Hacking.
- Staff and Employees of colleges/school can join this training to live more secure from various attacks.
Pre-requisites
- Only Basics of Internet.
- What you need to bring
Things required for Online Training
- Laptop or Desktop (Os: Windows / Linux / Mac)
- Internet Connection (Speed: min 25 Mbps)
- Headphones with mic
Key Take Away
- The premier Certification in Ethical Hacking & Information Security
- Hacking and Security Tools, Books, Tutorials to each student
- Training by White Hat Hackers, Ethical Hackers, and Information Security Experts
- Covers both sides of the coin - Attacks and Counter measures
- Live training on pre attacks with their Counter measures, Hands on use many technical tools