Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

Ultimate Hacking: Expert

( Duration: 4 Days )

In Ultimate Hacking: Expert training course, you will test and develop the skills with the latest knowledge and weapons to defend against sophisticated attacks while discovering how to safeguard their organization’s critical information assets.

By attending Ultimate Hacking: Expert workshop, delegates will learn:

  • How to effectively monitor the network for inappropriate behavior
  • Intrusion detection techniques and how to implement an Intrusion Detection System (IDS)
  • Network reconnaissance techniques
  • Advanced attack and defense strategies
  • Capabilities of advanced hackers
  • Common misconfigurations to avoid
  • Techniques to bypass firewalls, anti-virus, and IDS
  • SQL injection, XSS techniques, and CSRF detection and exploitation
  • How to identify and exploit buffer overflows

Advanced UNIX and Windows competency is required for the course to be fully beneficial.

This Ultimate Hacking: Expert class is aimed at experienced security administrators, security auditors, and/or security consultants.

COURSE AGENDA

1

Network Monitoring

  • The Case for Monitoring and Detection
  • Advanced Usage of Network Monitoring Tools
  • Analyzing Full-Content and Session Data
  • Implementing an Intrusion Detection System (IDS)
  • Advanced Features and Analysis of Snort
2

Illicit Monitoring

  • ARP
  • Intercepting and Monitoring Popular Protocols
  • Sniffing in a Switched Environment
  • Creating Customer Man-in-the-Middle Attacks
  • Man-in-the-Middle Methods
  • Countermeasures
  • Common Tools and Techniques
3

Network Reconnaissance

  • Exploration of the Most Popular Tools
  • Creating Custom Reconnaissance Scripts
  • Scanning Methodology
  • Scanning Efficiently
  • Advanced OS and Service Identification
  • Countermeasures
  • Advanced Port Scanning Techniques
4

Pen Testing with Metasploit

  • Exploitation
  • Payloads and Post Exploitation
  • Avoiding Detection
  • Advanced Features of Metasploit
  • Tracking Progress
  • Extending Metasploit
  • Enumeration
  • Countermeasures
  • Brute Force Attacks
5

Advanced Web Hacking

  • SQL Injection
  • Advanced Topics in SQL Interjection
  • Cross-Site Scripting (XSS)
  • Advanced XSS
  • XSS Frameworks
  • Cross-Site Request Forgery (CRSF)
  • Countermeasures
6

Database Hacking

  • Database Discovery and Service Enumeration
  • Common Misconfigurations
  • Database Content Enumeration
  • Analysis of MSSQL Stored (and Extended Stored) Procedures
  • OS Interaction Through the Database (Shovel the Shell)
  • Countermeasures
7

Windows Rootkits and Memory Analysis

  • Rootkit
  • Using Rootkits
  • Windows Memory Analysis
  • Detecting and Removing Windows Rootkits
  • Countermeasures
8

Code-Based Vulnerabilities

  • Foundational Study of Computer Architecture, Memory, and Data Structures
  • Static Code Analysis
  • Using Debuggers to Discover Potential Vulnerabilities
  • Creating Buffer Overflow Exploits
  • Types of Code-Based Vulnerabilities
  • Countermeasures

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X