Network Pentest Course 1692353982
Network Pentest Course 1692353982
Network Pentest Course 1692353982
PENETRATION TESTING
www.ignitetechnologies.in
ABOUT
Well-Known Entity for Offensive Security
ABOUT US
With an outreach to over a million students
and over thousand colleges, Ignite Technologies stood out
to be a trusted brand in cyber security training and services
WHO
CAN
College Students
IS/IT specialist, analyst, or manager
IS/IT auditor or consultant
IT operations manager
Network security officers and WHY
Practitioners
Site administrators
Level up each candidate by providing the
Technical support engineer
fundamental knowledge required to begin the
Senior systems engineer
Sessions.
Systems analyst or administrator
Hands-on Experience for all Practical
IT security specialist, analyst, manager,
Sessions.
Architect, or administrator
Get Course PDF and famous website links for
IT security officer, auditor, or engineer
content and Tools
Network specialist, analyst, manager,
Customized and flexible training schedule.
Architect, consultant, or administrator
Get recorded videos after the session for each
participant.
Get post-training assistance and backup
sessions.
Common Platform for Group discussion along
with the trainer.
Work-in Professional Trainer to provide realtime
exposure.
Get a training certificate of participation.
BENEFITS
Gain Exposure to Real-Time Pentesting in-depth
This course meets the requirements of NIST, MITRE ATTACK
Building in-house lab for threat hunting
Gain in-depth knowledge of Network Threats
Hands-on exposure to Network Pentest tools.
Latest attack such as zero day exploit.
PREREQUISITES
The candidate should have a basic understanding of Networking and also
know the fundamental approach of system hacking or ethical Hacking.
NETWORK PENETRATION TESTING
Network penetration testing is one of the most efficient methods in weeding out any loopholes
and underlying vulnerabilities in the network before it is compromised and can be exploited, by
performing attacks on the organization’s network infrastructure. Conducting a network pentest
also enables the enterprise to develop the appropriate mitigation and recovery strategies.
• Promiscuous Mode
• Output formats
• Display filter
• Endpoints Analysis
05. Detecting Live Systems
& Analyzing Results
• Fragment Scan
• TTL Scan
• Post Exploitation
• Hydra
• Medusa
• Crunch
09. FTP Penetration
• CeWL Testing
• cUPP
• Banner Grabbing
• Banner Hiding
• FTP Exploitation
• Pivoting
10. SSH Penetration
Testing
• Banner Grabbing
• Banner Hiding
11. Telnet Penetration • Port Redirection
Testing • Brute Force & Password Cracking
Port Redirection
Penetration Testing
• DNS Enumeration
• SMB Enumeration
• Enum4Linux
• SMB DOS
• MySQL Enumeration
16. Remote Desktop • Extract MySQL-Schema Information
Penetration Testing • Execute MySQL query Remotely
• DOS Attack
• Banner Grabbing
• Banner Hiding
• Port Redirection
18. Credential Dumping
• Brute Force & Password Cracking
• Application Creds
• Fake Services
• HTTP
20. Sniffing & Spoofing
• Introduction
• DNS Spoofing
• Introduction to DOS Attack
• ICMP Redirect
• Botnet
• NTLM Hash Capture
• D-DOS Attack
• UDP Flood
• Smurf Attack
• Persistence_Service
• Persistence_Exe
• Registry_Persistence
• Working of Honeypots
• Types of Honeypots
Honeypots
24. Firewall
• Introduction to Firewall
• Types of Firewall
25. Intrusion Detection • Windows Firewall
System
• Linux Firewall
• Working of IDS
• Types of IDS
• Nexpose
CONTACT US
Phone No.
+91 9599 387 41 | +91 1145 1031 30
WhatsApp:
https://wa.me/message/HIOPPNENLOX6F1
EMAIL ADDRESS
[email protected]
WEBSITE
www.ignitetechnologies.in
BLOG
www.hackingarticles.in
LINKEDIN
https://www.linkedin.com/company/hackingarticles/
TWITTER
https://twitter.com/hackinarticles
GITHUB
https://github.com/ignitetechnologies