Reference

Hands on Ethical Hacking and Penetration Testing

There is a need to understand hacker's mind and methodology to hack a network in order to defend the networks. This training course is designed for the participants who want to link with this cyber world. In this course, students will learn stepwise approach towards penetrating and testing the networks. Hands-on training will be provided to the participants which will help them to execute their knowledge in the industry and to test and secure their organization. The training will involve all three hats of hacking, social engineering, and wireless network sniffing and cracking. The participants will experience and learn all the skills a hacker possess in order to get the organization secure.


Course Syllabus:

This course is divided into several modules which include:

  1. Penetration Testing Scoping
  2. Setting up Kali Linux and usage
  3. Information Gathering
  4. Scanning
  5. Vulnerability Assessment
  6. Exploitation
  7. Man in the Middle Attacks
  8. Client Side Exploitation Attacks
  9. Password Cracking
  10. Wireless hacking and cracking
  11. Writing a report


Course Duration:

This will be five days course. The training will be provided at different venues all over the country. 


Course Prerequisites and Requirements:

The participant should have knowledge of the Networks and basic knowledge about the Linux commands.

The participant is required to have laptops with cross virtualization application (Virtual Box or Vmware) and Kali Linux installed.

  • The Laptop should have minimum 4GB RAM
  • The Laptop should have minimum 50GB free hard drive space 


For more details please write us at info@glockia.com or leave a message here