GB
/
GBP
/
EN

Shaping the future of IT skills

Maximising IT performance through learning

NotSoSecure Hacking 101

WGAC-CSI-HACKING101

NotSoSecure

Description

Show Tabs
Introduction

This 1-day course will teach you the foundations of Pen Testing and how to find and exploit vulnerabilities within different technologies.

This introductory course will train attendees in understanding Pen Testing, and provide background information on risks and vulnerabilities associated with different systems and provide insight to how the mindset of a hacker works. Delegates will also get access to an online course environment platform which will be used to practice the concepts taught during the course.

Prerequisites & Audience
No prior experience is required to take this course
Course Benefits
Attendees will gain understanding in the following topics:
Understand different network topologies and addressing schemes
Understand the properties and security of common network protocols and thenetwork protocol stacks.
How to fingerprint, enumerate and exploit common windows and linux
misconfigurations and vulnerabilities.
Differentiate between types of wireless standards and understand the benefits andrisks associated with these standards.
How to exploit common web application security flaws.
Course Topics

Hacking Fundamentals

  • Hacking History 101
  • Hacking in 2018
  • CIA Triad
  • Art of Hacking Methodology
  • Introduction to Kali Linux

Network Security

  • Network Fundamentals
  • MAC Addressing and Network Addressing
  • Introduction to Port Addressing
  • Understanding the OSI Layer and TCP/IP Model
  • Domain Name System (DNS) Attack Surface
  • TCP vs UDP
  • Network Scanning
  • Shodan

Linux Security

  • Introduction to Linux
  • Linux Filesystem Hierarchy
  • Linux File Permissions 
  • Berkeley Rsh/Rlogin Services
  • Network File System (NFS) Security
  • Missing Security Patches
  • Vulnerability Identification
  • Case Study: Shellshock
  • Introduction to Metasploit

Windows Security

  • Windows Fundamentals
  • Windows Password Hashing
  • Workgroups vs Domains
  • Windows Authentication
  • Windows Exploitation 101
  • Client-Side attacks
  • Case Study: WannaCry

Hacking CMS Software

  • Introduction to Content Management Systems
  • Enumerating CMS Platforms
  • Hacking WordPress
  • Joomla Exploitation

Web Security

  • HTTP Protocol Basics
  • Understanding Web Application Attack Surface
  • SQL Injection
  • Case Study: T alkT alk SQL Injection
  • Command Injection
  • Cross-Site Scripting (XSS)
  • Open Redirect

Wireless Security

  • WiFi Security 101 
  • Wired Equivalent Privacy (WEP) 
  • Wi-Fi Protected Access (WPA) 
  • WPA2 Security
  • Wi-Fi Protected Setup (WPS) flaws
  • Rogue Access Points Attacks

NotSoSecure courses


NotSoSecure Advanced Infrastructure Hacking - AIH
CODE: WGAC-CSI-AIH
NotSoSecure The Art of Hacking - AoH
CODE: WGAC-CSI-AOH
NotSoSecure Advanced Web Hacking - AWH
CODE: WGAC-CSI-AWH
NotSoSecure Hacking and Securing Cloud Infrastructure
CODE: WGAC-CSI-HSCI
NotSoSecure AppSec for Developers - APPSEC
CODE: WGAC-CSI-APPSEC
NotSoSecure DevSecOps - DEVSECOPS
CODE: WGAC-CSI-DEVSECOPS
NotSoSecure Hacking 101
CODE: WGAC-CSI-HACKING101
Webinar Hacking and Securing Cloud Infrastructure : The Anatomy of a Cloud Hack
CODE: WGAC-CSI-HSCI-WEBINAR
Webinar Basic Infrastructure Hacking : Through an Attacker's Eyes: Your Infrastructure
CODE: WGAC-CSI-BIH-WEBINAR
Webinar Basic Web Hacking : Through an Attacker's Eyes: Your Web Applications
CODE: WGAC-CSI-BWH-WEBINAR
We use cookies to understand how you use our site and to improve your experience. To learn more, click here. Read our revised Privacy Policy and Terms and Conditions.