Lunesys’ Ethical Hacking / Penetration Testing Training Workshop
The information security and hacking training go in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization’s network. You leave with the ability to quantitatively assess and measure threats to information assets; and discover where your organization is most vulnerable to hacking in this network security training course.
The goal of this course is to help you master a repeatable, document-able penetration testing methodology that can be used in an ethical penetration testing or hacking situation. This ethical security training course has a significant ROI (Return on Investment), you walk out the door with hacking skills that are highly in demand.
Some of the hacking concepts you will learn to master during this hands on hacking course:
- Penetration testing methodologies
- Stealthy network recon
- Passive traffic identification
- Remote root vulnerability exploitation
- Privilege escalation hacking
- IPv6 Vulnerabilities
- Remote access Trojan hacking
- Running shell-code in RAM vs. on disk
- Wireless insecurity
- Breaking IP-based ACLs via spoofing
- Abusing Windows Named Pipes for Domain Impersonation
- Evidence removal and anti-forensics
- Attacking network infrastructure devices
- Hacking by brute forcing remotely
- Hiding exploit payloads in jpeg and gif image files
- Hacking Web Applications
- Breaking into databases with SQL Injection
- Cross Site Scripting hacking
- Hacking into Cisco routers
- Justifying a penetration test to management and customers
- CEH/CPT review
- Defensive techniques
Some of the instructor-led hands-on hacking lab exercises in the security training experience:
- Abusing DNS for host identification
- Leaking system information from Unix and Windows
- Windows 2003 Server & Vista DNS Cache Poisoning Attacks
- Unix, Windows and Cisco password cracking
- Remote buffer overflow exploit lab – heap vs. stack overflows
- Attacking Kerberos Pre-Auth Hashes
- Spoofing endpoints of communication tunnels
- Impersonation of other Users- Hijacking kernel tokens
- Attacking RDP (Remote Desktop Protocol) in Windows XP, 2003 & Vista
- Remote keylogging
- Data mining authentication information from clear-text protocols
- Sniffing and hijacking SSL encrypted sessions
- Breaking wireless security via hacking
- Malicious event log editing
- Client side IE & Firefox exploits
- Tunneling through IPSec VPNs by abusing ESP
- Data retrieval with SQL Injection Hacking
- Calculating the Return on Investment (ROI) for an ethical hack
How You Benefit:
- Gain the in-demand career skills of a professional security tester. Learn the methodologies, tools, and manual hacking techniques used by penetration testers.
- Stay ethical! Get hands-on hacking skills in our lab that are difficult to gain in a corporate or government working environment, such as anti-forensics and unauthorized data extraction hacking.
- Move beyond automated vulnerability scans and simple security testing into the world of ethical penetration testing and hacking.
- More than interesting theories and lectures; get your hands dirty in our dedicated hacking lab in this network security training course.
Required Prerequisites:
- Firm understanding of the Windows Operating System
- Exposure to the Linux Operating System or other Unix-based OS
- Grasp of the TCP/IP protocols
- Desire to learn about the hacking and network security profession, stay ethical, and get great security training!
Lunesys’ Other Training Workshops
Ethical Hacking
Ethical Hacking / Penetration Testing Training WorkshopPenetration Testing
The control of information is something the elite always does… Information, knowledge, is power.” – Tom Clancy
Computer Forensics Investigator
The incident was not the end of the world. We can backtrack!Learn to uncover and interprete electronic data
How to conduct forensically sound computer examinations with forensic recovery techniques
CISSP Boot Camp
Credential demonstrates that an IT professional understands full range of security for the automated information system.Certified Information System Security Professional (CISSP)
Our CISSP boot camp course ensures that you can review the CBK in-depth and prepare for the certification exam.
Enterprise Security Awareness for IT Users
Information Technology professionals are typically in need of on-target security knowledge that they can directly apply to their everyday work.A Must-Have Training for Every IT User of your Organization
LuneSys’ Enterprise Security Awareness Training for IT Professionals utilizes lectures with hands-on lab work to ensure practical knowledge transfer.
Why Choose Lunesys
- We are not a jack-of-all-trades involved in every sort of business and training;
- We are focused on information security management purely, which rally us round understanding and facilitating the clients’ specific need;
- We have an extensive range of highly qualified trainers, a comprehensive range of professional public training courses, enabling the potential participants to hit upon and sign up for exactly the training they need, in their most suitable time span;
- We don’t only provide trainings but also offer the implementation of the theories, which gives us an edge to assist the participants later in their practical epochs;
- The most reasonable price is another advantage we offer;
- Our previous clients’ great satisfaction and highly-rating testimonials are our honor.