logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

Hands-On Hacking

SS Course: 2001224

Course Overview

TOP

You can name threats and vulnerabilities. You can match them with countermeasures and hacking tools. Now practice using the tools and tricks that make an ethical hacker great! This course is 100% hacking. Our expert instructor will be present to guide your experience and answer your questions, but your time will be spent with your fingers on a keyboard!

                                                                  

Scheduled Classes

TOP

What You'll Learn

TOP

Outline

TOP
Viewing outline for:

Module 1: Footprinting and Reconnaissance

  • Lab 1A: Network Route Trace Using Path Analyzer Pro
  • Lab 1B: Mirroring Website Using HTTrack Web Site Copier Tool
  • Lab 1C: Extracting Company's Data Using Web Data Extractor

Module 2: Scanning Networks

  • Lab 2A: Scanning System and Network Resources Using Advanced IP Scanner
  • Lab 2B: Banner Grabbing to Determine a Remote 
  • Lab 2C: Fingerprinting Open Ports Using the Amap Tool
  • Lab 2D: Monitoring TCP/IP Connections Using the CurrPorts Tool
  • Lab 2E: Exploring and Auditing a Network Using Nmap
  • Lab 2F: Sanning a Network Using the NetScan Tools Pro
  • Lab 2G: Drawing Network Diagrams Using LANSurveyor
  • Lab 2H: Mapping a Network Using the Friendly Pinger
  • Lab 2I: Auditing Scanning by Using Global Network Inventory
  • Lab 2J: Basic Network Troubleshooting Using the MegaPing
  • Lab 2K: Scanning the Network Using the Colasoft Packet Builder
  • Lab 2L: Scanning Devices in a Network Using The Dude

Module 3: Enumeration

  • Lab 3A: Enumerating a Target Network Using Nmap
  • Lab 3B: Enumerating NetBIOS Using the SuperScan Tool
  • Lab 3C: Enumerating NetBIOS Using the NetBIOS Enumerator Tool
  • Lab 3D: Enumerating a Network Using SoftPerfect Network Scanner
  • Lab 3E: Enumerating a Network Using SolarWinds Toolset
  • Lab 3F: Enumerating the System Using Hyena

 

 

 

Module 4: System Hacking

  • Lab 4A: Extracting Administrator Passwords Using LCP
  • Lab 4B: Hiding Files Using NTFS Streams
  • Lab 4C: Find Hidden Files Using ADS Spy
  • Lab 4D: Hiding Files Using the Stealth Files Tool
  • Lab 4E: Extracting SAM Hashes Using PWdump7 Tool
  • Lab 4F: Creating the Rainbow Tables Using Winrtgen
  • Lab 4G: Password Cracking Using RainbowCrack
  • Lab 4H: Extracting Administrator Passwords Using L0phtCrack
  • Lab 4I: Password Cracking Using Ophcrack
  • Lab 4J: Hiding Data Using Snow Steganography
  • Lab 4K: Viewing, Enabling and Clearning the Audit Policies Using Auditpol
  • Lab 4L: User System Monitoring and Surveillance needs Using Spytech SpyAgent
  • Lab 4M: Web Activity Monitoring and Recording Using Power Spy 2013
  • Lab 4N: Image Steganography Using QuickStego

Module 5: Trojans and Backdoors

  • Lab 5A: Creating a Server Using the ProRat Tool
  • Lab 5B: Wrapping a Trojan Using One File EXE Maker
  • Lab 5C: Proxy Server Trojan
  • Lab 5D: HTTP Trojan
  • Lab 5E: Detecting Trojans
  • Lab 5F: Creating a Server Using the Theef
  • Lab 5G: Hack Windows 7 Using Metasploit

Module 6: Viruses and Worms

  • Lab 6A: Creating a Virus Using the JPS Virus Maker Tool
  • Lab 6B: Virus Analysis Using IDA Pro
  • Lab 6C: Virus Analysis Using OllyDbg
  • Lab 6D: Creating a Worm Using the Internet Worm Maker Thing

Module 7: Sniffers

  • Lab 7A: Sniffing the Network Using the OmniPeek Network Analyzer
  • Lab 7B: Spoofing MAC Address Using SMAC
  • Lab 7C: Sniffing a Network Using the WinArpAttacker Tool
  • Lab 7D: Sniffing Passwords Using Wireshark
  • Lab 7E: Performing Man-in-the-Middle Attack Using Cain & Abel
  • Lab 7F: Advanced ARP Spoofing Detection Using Xarp
  • Lab 7G: Detecting Systems Running in Promiscuous Mode in a Network Using PromgryUI
  • Lab 7H: Sniffing Password from Captured Packets using Sniff-O-Matic

Module 8: Social Engineering

 

  • Lab 8A: Clone a Website
  • Lab 8B: Obtain User Names and Passwords Using the Credential Harvester Method
  • Lab 8C: Generate Reports for Conducted Penetration Tests

Module 9: Denial of Service

  • Lab 9A: SYN Flooding a Target Host Using hping3

Module 10: Session Hijacking

  • Lab 10A: Session Hijacking Using the Zed Attack Proxy (ZAP)

Module 11: Hacking Webservers

  • Lab 11A: Footprinting Webserver Using the httprecon Tool
  • Lab 11B: Footprinting a Webserver Using ID Serve

Module 12: Hacking Web Applications

  • Lab 12A: Hacking Web Applications
  • Lab 12B: Website Vulnerability Scanning Using Acunetix WVS

Module 13: SQL Injection

  • Lab 13A: SQL Injection Attacks on MS SQL Database
  • Lab 13B: Testing for SQL Injection Using IBM Security AppScan Tool

Module 14: Hacking Wireless Networks

  • Lab 14A: Cracking a WEP Network with Aircrack-ng for Windows
  • Lab 14B: Sniffing the Network Using the OmniPeek Network Analyzer

Module 15: Evading IDS, Firewalls and Honeypots

  • Lab 15A: Detecting Intrusions Using Snort
  • Lab 15B: Detecting Intruders and Worms Using KFSensor Honeypot IDS

Module 16: Buffer Overflow

  • Lab 16A: Buffer Overflow Example

Module 17: Cryptography

  • Lab 17A: Basic Data Encryption Using HashCalc
  • Lab 17B: Basic Data Encryption Using MD5 Calculator
  • Lab 17C: Basic Data Encryption Using Advanced Encryption Package
  • Lab 17D: Basic Data Encryption Using TrueCrypt
  • Lab 17E: Basic Data Encryption Using CrypTool
  • Lab 17F: Encrypting and Decrypting the Data Using BCTextEncoder
  • Lab 17G: Basic Data Encrypting Using Rohos Disk Encryption 

Prerequisites

TOP

Before attending this course, students should have:

  • At least two years of experience in IT security 
  • Strong understanding of TCP/IP

    Who Should Attend

    TOP

    This course fortifies the experience of IT security professionals to help them recognize and quickly act to detect weaknesses and vulnerabilities within network infrastructures. Candidates include:

    • Auditors
    • Site Administrators
    • Security Officers
    • Security Professionals

    Next Step Courses

    TOP