Network Security & Exploitation

Learn Fundamental Aspects of Security in Modern Networked Environment

About Course

With the explosion of internet and e-world, computer networks, if adequately not secured, are getting targeted for a large amount of threats, and exploited further which can cause huge damages to the enterprise. The primary goal of this course is to give a good idea on various network security issues, how to identify them, and what are the proper controls that need to be implemented to prevent these security issues.

This training covers fundamental aspects of security in a modern networked environment with the focus on system design aspects in the specific context of network / internetwork security. We take a peek into network security best practices such as LAN segregation, Network Controls, Logging, Hardening, DMZ configuration, Traffic Analysis and Monitoring Tools etc. Router and Wireless Security are also discussed later.

Who should attend this course?

Anyone looking to build a career in information security, or if you're someone who's already in this field, but want to learn the professional concepts of hacking, then this is the course for you. It simply will not get more practical and more hands-on than this. Instead of burdening you with a huge amount of courseware, and hundreds of tools, the CPH course focuses on the real-world practical tools and techniques of hacking.


6 Weeks

Course Contents

  • Introduction & Case Studies
  • Understanding PenTest methodologies (black/white/gray – box)
  • Backtrack (BT) OS – The Hacker’s Box
  • Understanding Linux (BT) structure
  • BT Basic Usage
  • Network Basics
  • TCP/IP Fundamentals
  • Common TCP and UDP services
  • Understanding ICMP messages
  • Understanding things in the packet layer
  • Wireshark – The packet analyzer
  • Analyzing the host-to-host packet transmission
    • synchronizations of hosts
    • termination of hosts
    • finishing of host
  • Fingerprinting & Footprinting
  • Google hacking
  • Portscanning
  • Mastering Nmap
  • Netcat Kungfu
  • Packet crafting using hping3
  • Finding Vulnerability – Manual methods
    • Banner Grabbing
    • Testing on clear text protocols (FTP, TFTP, Telnet, HTTP)
    • Testing on SNMP
    • Testing on SMTP
    • Testing on Finger
    • Testing on DB ports
  • Service Level Security
    • Hardening FTP
    • Concept of ACL
    • Hardening SSH
    • Hardening SMTP Server
    • Hardening IIS Server
    • Hardening Apache Server
  • Finding vulnerability – Automated methods
    • Nessus Vulnerability scanner
    • GFI scanner
    • Interpreting the automated scanner report
    • Getting exploit code – Exploitation Framework (msf introduction)
    • Getting into the system
    • Attacking LAN
  • Metasploiting the target
    • Metasploit the universe
    • Metasploit Module & Architecture
    • Working with Auxiliaries
    • Working with Exploits
    • Working with encoders
    • Working with payloads
    • Understanding Meterpreter
  • Network security
    • Secure Network design
    • DMZ
    • VLANs
    • Firewalls
    • IDS / IPS
    • Wireless LAN Security
    • VPNs
  • Wireless security
    • Understanding Wireless Technology
    • Protocol Analysis
    • Attacks on Open Authenticated WiFi
    • Dumpsterdiving WEP
    • Knowing Algorithmic Defects (RC4)
    • WPA/WPA2 Security
    • Wardriving Concepts

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content