Network Security and Penetration Testing
Key Features
- 3 days Instructor-Led Live Online Classroom
- Webex Virtual Class for interactive near classroom experience
- Access to Remote Lab PC for Hands-On activities
- Unlimited Practice exams
- Integrated Courseware in the Learning Management System
- Step by Step guide for challenging hands-on lab activities
- Flexible Schedules – Both Weekdays and Weekends Classes
- Get Trained by Network Security and Penetration Expert Trainer with Over 15 Years of Industry Experience
- No. 1 Training Center for Network Security and Penetration Courses
- E-learning Access for Pre-course and Post Training Support
- Best Price Guaranteed for Network Security and Penetration Courses
Key Features
- 3 days Instructor-Led Face to Face Classroom training
- We are a TESDA Registered Training Center
- Offering Flexible Schedules – Both Weekdays and Weekends Classes
- Get Trained by Network Security and Penetration Expert Instructor with Over 15 Years of Industry Experience
- No. 1 Training Center for Network Security and Penetration Courses
- We Guarantee Best Price for Network Security and Penetration Courses
Key Features
- Gain the technical skills needed in the workplace. 1 on 1 training is the best way to learn
- Quickest way to master any of our course offerings.
- Experience superb hands-on laboratory activities and unobstructed attention from your trainer.
- Guaranteed to start the Training
TRAINEE FEEDBACKS
About the Course:
This HANDS-ON training gives you knowledge and skills on how professional penetration testing is conducted and the methodologies behind performing an attack. The training starts with the fundamentals of network security, ethics of ethical hacking, and legal issues. During the training, It will provide a selection of Hacker tools and how to use them. It teaches you the fundamentals of system exploitation, footprinting, scanning, enumeration, password attacks, escalation of privilege, and documentation requirements. A hands-on experience conducting your own penetration test on actual servers.
Get our Network Security penetration testing course.
PREREQUISITE
- Particpants must be knowledgeable in basic Linux command.
- Participants must have computer networking knowledge.
Employment Objectives
Upon completion of the course, trainees will be qualified to be a junior security engineer, security consultant, security associate or junior information assurance technician.
COURSE CURRICULUM
Network Security Syllabus
Chapter I - Introduction to Penetration testing
• What is Penetration testing
• Discuss hacking terminology
• Steps in Penetration Testing
Chapter II - Introduction to Kali Linux
• History of Kali Linux
• Difference between Backtrack and Kali
• Comparison: Kali 2.0 vs old Kali
• Discuss new feature of Kali 2.0
Chapter III - First Stage of Penetration testing
• Information Gathering
a. Discuss and perform: Footprinting
b. Discuss and perform: Scanning & Enumeration
c. Discuss and perform: Vulnerability Analysis
Chapter IV - Second Stage of Penetration testing
• Attack phase
a. History of metasploit
b. Explain metasploit in kali 2.0
c. Run/execute metasploit
Chapter V - Attack Phase (second part)
a. Pivoting attack
b. Social engineering attack
c. SQL injection
Chapter VI - Attack Phase (third part)
a. Password cracking
b. Wifi password cracking (WEP, WPA)
COURSE FEE
COURSE SCHEDULES
3 days / 8am - 6pm (30hrs)
Next Level Courses
Call Us for more information
Tel: (+632) 8285-2936 / (+632) 8736-2032
SMART: 09204282022 / 09603525900
GLOBE: 09773282627 / 09563346864
GET STARTED
Request Course Quotation
Virtual/Webex Learning
Take advantage of CNCTC 's latest interactive Instructor-Led Live Online Training. Online Courses are delivered using WebEx to bring the classroom to your home or at your workplace and can be accessed directly on your own computer with an internet connection. By using Cisco’s WebEx, and integrating our Computer lab facilities, we can provide a near-classroom experience remotely to your own location of choice. Register Now!