CYBERSECURITY NEWS

MMSCYBER006: Penetration Testing & Vulnerability Analysis (3 Days)

Course Description

This course is designed for Penetration testers or Ethical hackers who are looking to expand their knowledge in exploitation and hacking techniques, as well as network penetration. Before you begin this course, you should have a familiarization with Windows and/or Unix/Linux operating systems, along with basic understanding of TCP/IP and networking. Network Penetration Testing and Vulnerability Analysis is designed to conduct a full, real-world cyber lab-environment that will challenge students with integrated lab exercises and sessions to fully utilize the concepts of penetration testing.

Students will learn various types of vulnerability analysis, and policy scanning. This course will utilize many different demonstrations to model real world attacks and learn how to protect against them. Participants will use the latest tools and methods in detailed reconnaissance and information gathering. This course is specified in targeting the latest exploitation techniques and methodologies. As well as the post-exploitation side of ethical hacking.

The main goal of this course is to help you master the knowledge and analytical skills needed that can be used in a real ethical penetration test or hacking situation. Participants will implement password cracking, vulnerability scanning, and creating malware using the latest tools and techniques that are available today.

After completing this course, students will be able to:

  • Perform Passive and Active Reconnaissance
  • Process of Local Information Gathering
  • Importance of Vulnerability Analysis
  • Exploitation and hacking techniques
  • Post exploitation techniques
  • Different Forms of Password Cracking
  • Implement Social Engineering
  • Understand a wide variety of methodologies, techniques and tools

Course Outline

Module One: Introduction to Penetration Testing

Module Two: Preparation- Scoping/Preengagement 

Module Three: Reconnaissance

  1. Public Search Methods
    • Network Reconnaissance
  2. Banner Grabbing tools
    • Basic Command Line Operations
    • Footprinting tools
    • Open Source Softwares
  3. Searching for e-mails

Module Four: Threat Modeling         

Module Five: Vulnerability Scanning

  1. Port Scanners
    • Vulnerability analyzers

Module Six: Exploitation and Hacking Techniques

  1. Bypassing Windows Authentication
  2. Man in the Middle (MITM) Attacks
  3. Phishing and Password Capture
  4. Hacking Linux
  5. Malware Injection
    • Evading Antivirus
  6. Password Attacks

Module Seven: Post Exploitation

  1. Local Privilege Escalation
  2. Local Information Gathering
    • Searching for Files
    • Keylogging
    • Gathering Credentials
    • .net Commands
    • Token Impersonation
    • Port Scanners
    • Bypassing UAC
  3. Interactive Lab

Module Eight: Reporting

  1. Culminating Exercise