This training is based on a practical approach of day-by-day situations and it contain labs based on real environments. For the labs, target virtual machines are provided.
The course objective is to help you learn to master the (ethical) hacking techniques and methodology that are used in penetration systems. The course is designed for IT passionate, network and system engineers, security officers.
Below are the main topics, both theoretical and practical, of this course:
Chapter 1: Introduction to Ethical Hacking, Footprinting and Reconnaissance
Chapter 2: Scanning Networks, Enumeration and Vulnerabilities
Chapter 3: System Hacking
Chapter 4: Sniffing
Chapter 5: Metasploit
Chapter 6: Trojans, Backdoors, Viruses and Worms
Chapter 7: Cryptography
Chapter 8: Penetration testing on Wireless Networks
Chapter 9: Penetration Testing