- Overview of Network Security
- TCP/IP Packet Analysis
- Linux Server Installation
- Port and Protocols and Analysis
- Basic commands (Windows / Linux)
- Windows Client / Linux Installation
- Kali Linux Installation
- Home
- Infosec Train
- Courses
- Network Penetration Testing Online Training
Network Penetration Testing Online Training Course
Join Network Penetration Testing Online Training Course by Infosec Train and detect exploitable vulnerabilities in systems, networks, hosts and network devices.
Online
Quick facts
particular | details | |
---|---|---|
Medium of instructions
English
|
Mode of learning
Self study, Virtual Classroom
|
Mode of Delivery
Video and Text Based
|
Course overview
The Network Penetration Testing certification course from Infosec Train is designed to teach you all about ethical hacking or penetration testing from a networking perspective. You will learn the fundamentals of network-based ethical hacking. The training will prepare you to become a professional penetration tester.
This Network Penetration Testing online course helps you understand the exploitation techniques a hacker might employ on networks. Ultimately you will become an expert in identifying, exploiting, and securing various vulnerabilities in the network.
By completing the Network Penetration Testing Online Training Course, you will also get acquainted with networking tools like TCPDump or Wireshark and additional techniques. The programme is focused on making you adept at using the latest penetration tools to secure your client’s network.
Furthermore, this training aims to prepare you for various certifications, including Certified Penetration Tester (CPT), CompTIA Pentest+, Certified Ethical Hacker (CEH), and Certified Expert Penetration Tester (CEPT). The Network Penetration Testing programme includes 40 hours of instructor-led sessions, real-life scenarios to inculcate practical skills, and hands-on exposure to a wide range of vulnerabilities.
The highlights
- Certified mentors
- Real-life scenarios for practical learning
- Customised corporate learning
- 40 hours of instructor-led session
- One-to-one (personalised) training
- Hands-on exposure with vulnerabilities
- Certified Penetration Tester (CPT) (preparation)
- CompTIA Pentest+ (preparation)
- Certified Ethical Hacker (CEH) (preparation)
- Certified Expert Penetration Tester (CEPT) (preparation)
- Recorded sessions
- Demo class (free of cost)
Program offerings
- Certified mentors
- Customised corporate learning
- Recorded sessions
- Real-life scenarios for practical learning
- 40 hours of instructor-led sessions
- Hands-on exposure with vulnerabilities
- One-to-one (personalised) training
- Demo class (free of cost)
Course and certificate fees
certificate availability
certificate providing authority
Eligibility criteria
The Network Penetration Testing training by Infosec Train requires knowledge of Windows OS and TCP/IP protocols. You should be able to handle Unix-based operating systems like Linux Operating System or others. You should also have experience using network reconnaissance and associated tools such as Nessus, Nmap, Netcat.
What you will learn
After you finish Infosec Train’s Network Penetration Testing Online Training Course syllabus, you will:
- Be prepared to score the following certifications, including Certified Penetration Tester (CPT), CompTIA Pentest+, Certified Ethical Hacker (CEH), and Certified Expert Penetration Tester (CEPT).
- Master the tools, methodologies, and manual hacking techniques deployed by ethical hackers or penetration testers.
- Add expertise to your professional skills as a professional security tester.
- Experience hands-on and applied hacking skills to counter hackers and secure the networks.
Who it is for
The Network Penetration Testing online programme is well-suited for:
- Penetration testers
- Professionals interested in learning about ethical hacking and penetration testing
- Cybersecurity consultants
- Security analysts
Admission details
- Visit the Network Penetration Testing Online Training Course page.
- Here, you can check course features, syllabus, demo class details, training calendar, learning modes, and more. Tap on ‘Enrol Now’.
- When the pop-up appears, provide name, email, training required (as a comment), phone no., and country name. If you are enrolling for the corporate version, put your company name and employee count as well.
Filling the form
Start your enrolment process in Infosec Train’s Network Penetration Testing certification course by filling in the data fields of a pop-up box. Include your name, email address, training required (as a comment), phone no., and country name. For proceeding with the corporate training option, furnish your company name and employee count as well.
The syllabus
Module 1
Introduction
Module 2
Wireshark
- Introduction
- Packet Forensics
- ARP Packet Analysis
- ICMP Packet Analysis
- Nmap Packet Forensics
- Tracert Command Analysis
- 3-way handshake Analysis
Module 3
Network Sweeping
- NMAP Basics
- FIN Scan
- SYN Scan
- OS Discovery
- NULL Scan
- XMAS Scan
- UDP Scan
Module 4
Nmap Firewall Scan
- Data Length Scan
- Source Port Scan
- Spoof IP Scan
- Decoy Scan
- Data String Scan
- TTL Scan
- Spoof MAC Scan
- Fragment Scan
- IP Options Scan
- Hex String Scan
Module 5
Metasploit
- Msfvenom
- Metasploit Basic
- Shell on the Fly (Transport)
- Windows Reverse TCP
- Auxiliary scanner
- Hidden Bind TCP
- Windows HTTPS Tunnel
- Post Exploitation
- Bypass User Access Control
- Pass the Hash
- Macro Payloads
Module 6
Dictionary and Passwords Attacks
- Medussa
- Hydra
- WCE
- Crunch
- Mimikatz
- CeWL
- Online attacks
- cUPP
Module 7
FTP Penetration Testing (Port 21) Introduction and Lab setup
- Port forwarding /Time Scheduling
- Banner Grabbing/Banner Hiding
- Pivoting/Tunneling [windows]
- Brute forcing/Secure
Module 8
SSH Penetration Testing (Port 22)
- Introduction and Lab setup
- Port forwarding /Time Scheduling
- Banner Grabbing/Banner Hiding
- Brute forcing/Secure
- Multiple-way to secure ssh
- Pivoting/Tunneling
Module 9
Telnet Penetration Testing (Port 23)
- Introduction and Lab setup
- Port forwarding /Time Scheduling
- Banner Grabbing/Banner Hiding
- Pivoting/Tunneling
- Brute forcing/Secure
Module 10
SMTP Penetration Testing (Port 25)
- Introduction and Lab setup
- Brute forcing/Secure
- Port forwarding /Time Scheduling
- Banner Grabbing/Banner Hiding
- Penetration testing with SWAKS
Module 11
DNS and DHCP Penetration Testing (Port 53, 67, 68)
- Introduction and Lab setup
- DHCP Packet Analysis with Wireshark
- DNS Enumeration
- DHCP Starvation attack
- Tools (Gobbler, Yersinia, responder)
- Rogue DHCP Server
Module 12
NetBIOS and SMB Penetration Testing (Port 135-445)
- Introduction and Lab setup
- SMB Null Sessions
- SMB Enumeration
- NetBIOS Spoofing
- Enum4Linux
- Banner Grabbing/Banner Hiding
- Pivoting/Tunneling
- Brute forcing/Secure
- Multiple-way to connect smb
- Penetration Testing with (PS exec, eternal blue)
Module 13
SNMP Penetration Testing (Port 161, 162)
- Introduction and Lab setup
- Port forwarding /Time Scheduling
- Banner Grabbing/Banner Hiding
- Penetration Testing with Metasploit and Nmap
- Brute forcing/Secure
Module 14
MSSQL Penetration Testing (Port 1433)
- Enumerate MSSQL configuration setting
- MSSQL Brute force Attack
- Identify Database owner
- Identifying SQL Server logins
- Identify users with masquerade privilege
- Retrieve MSSQL Password Hashes of Users
- Execute SQL Statement
- Extracting MYSQL Schema Information
- Decode Password Hashes of Users
Module 15
MySQL Penetration Testing (Port 3306)
- Introduction & Lab setup
- mysql banner user/file/ Enumeration
- MYSQL Brute Force Attack
- Check File Privileges
- Stealing MYSQL information
- Prevent Mysql against brute force attack
- Enumerate MYSQL writeable directories
- Crack Hash Password with John the Ripper
- Extract MYSQL Username with Hash Password
- Secure MYSQL through port forwarding
Module 16
Remote Desktop Penetration Testing (Port 3389)
- Introduction and Lab setup
- Port forwarding /Time Scheduling
- Banner Grabbing/Banner Hiding
- DOS Attack
- Pivoting/Tunneling
- Brute forcing/Secure
Module 17
VNC Penetration Testing (Port 5900, 5901)
- Introduction and Lab setup
- Port forwarding /Time Scheduling
- Banner Grabbing/Banner Hiding
- Penetration Testing with Metasploit & Nmap
- Brute forcing/Secure
- Pivoting/Tunneling
Module 18
Sniffing and Spoofing
- Introduction
- MAC Address Snooping
- ARP Poisoning
- DNS Poisoning
- DNS Spoofing
- Xerosploit
- Capture NTLM Hashes
Module 19
Socks Proxy Penetration Testing
- SSH
- Socks proxy lab setup
- HTTP
- FTP
Module 20
IDS, Firewall, Honeypots
- Understanding Snort Rules
- Setup Snort Lab in Ubuntu
- ICMP Detect
- Detect Dos Attack
- Introduction to Windows Firewall
- Introduction to IPtables
- Detect Nmap Scan
- TCP Packet Detect
- Antivirus Evasion with veil
Module 21
DOS Attack Penetration Testing
- Introduction to DOS Attack
- D-DOS Attack
- Botnet
- SYN Flood Attack
- Smurf Attack
- UDP Flood
- Others DOS Attack Tools
- Packet Crafting
Module 22
Social Engineering Attack
- Introduction to Social Engineering Attack
- Java Applet Attack
- Payload & Listener Attack
- MSFPC
- HTA Attack
- DOS Attack
- VNC Attack
- PowerShell Attack Vector
Module 23
Covering Tracks and Maintaining access
- s4u_persistence
- Persistence
- Clear Event Logs
- VSS_Persistence
- Netcat
- Registry Persistence
Module 24
Network Vulnerability Assessment Tool
- GFI Languard
- Nessus
- Openvas
- Nexpose
- MBSA
How it helps
The Network Penetration Testing programme benefits include in-depth preparation for four certifications, including Certified Penetration Tester (CPT), CompTIA Pentest+, Certified Ethical Hacker (CEH), and Certified Expert Penetration Tester (CEPT). The certificate programme uses real-life scenarios and hands-on exposure with diverse vulnerabilities to make you industry-ready.
FAQs
The programme entails an understanding of TCP/IP protocols and Windows OS. You should also know how to handle Unix-based operating systems such as Linux Operating System or others. You need experience in applying network reconnaissance and associated tools such as Nessus, Nmap, Netcat.
Certified Penetration Tester (CPT), CompTIA Pentest+, Certified Ethical Hacker (CEH), and Certified Expert Penetration Tester (CEPT).
Yes. The course is best suited for security analysts, penetration testers, cybersecurity consultants, and those interested in exploring concepts of ethical hacking and penetration testing.
One-to-one (personalised) training, corporate learning (customised), and online training are available.
Instructor-led training of 40 hours is provided.