Penetration Testing and Ethical Hacking
This course teaches you the practical skills needed to conduct in-depth penetration tests against your organization’s network systems. The course covers advanced techniques spanning the lifecycle of a penetration test from active probing to post exploitation. The students will first learn advanced network mapping and port scanning techniques. Then, they will know how to search, discover, analyze, and assess existing vulnerabilities. From there, the course progresses into the art of exploitation, and the student will learn how exploits are constructed, and how exploitation framework operates. One of the labs in this courses is the exploitation of unpatched Windows system using the infamous Eternalblue exploit. Finally, the student will learn extreme post-exploitation tactics and strategies. The student will have the chance to work with top penetration testing platforms and tools, which are Kali Linux, Nmap, Nessus, Metasploit, and Meterpreter.
Outline
Part 1: Network Mapping and Scanning
- Host Discovery.
- Port Scanning.
- Service Identification.
- Operating System Fingerprinting.
Part 2: Vulnerability Analysis
- Vulnerability Categories.
- Online Vulnerability Databases.
- Vulnerability Scoring System.
- Automated Vulnerability Scanning.
Part 3: Exploitation
- Bind and Reverse Shell.
- Types of Payloads.
- Online Exploit Databases.
- Working with Metasploit.
Part 4: Post-Exploitation
- The Meterpreter Payload.
- Victim Information Gathering.
- Erasing Event Logs.
- Persistent Backdoor.
- File System Interaction.
- Pivoting and Relaying.