Network Penetration Testing - NPT Training provided by gicseh training institute in noida
Network Penetration Testing - NPT free videos and free material uploaded by gicseh training institute staff .
Introduction to Networking Security(Day1,Day2,Day3)
About Penetration Testing
Networking security consists of the provisions and policies adopted by a Networking administrator to prevent and monitor unauthorized access, misuse, modification, or resources.
Prentration Testing Lab Setup(Day4,Day5,Day6)
As per as to the configuration of Laptop, 32/64 bit, provide VMware, and any Penetration testing OS like Kali/Backbox, Windows XP SP2, Windows 7 Setup VMware, OSs on it using Bridge Connection.
Deep Information Gathering(Day7,Day8,Day9)
1. Passive Information Gathering in depth.
2. Scanning target using nmap advanced features.
3. Vulnerability Scanning.
Getting Into System(Day10,Day11,Day12)
1. Exploiting Windows and Linux System
2. Application of Metasploit
3. Creating malicious files (standalone binaries) using msfvenom
4. Outgoing through browser
5. Evading Antivirus
6. Bruteforcing on Ports
7. Exploiting using different File Format
Sniffing & MITM(Day13, Day14)
Studying ARP, RARP, how it works and how it can be modify to mount sophisticated outgoings is made extremely easy to understand. The Sniffing is a technique that you will be able to fully grasp in its most practical aspects.
Post Exploitation(Day15, Day16)
Experienced instructors have come up with a proven methodology to conduct thorough Exploitation of remote internal Networking through advanced Post exploitation techniques. Once the candidate is comfortable with most recent exploitation techniques, will be exposed to the cyclic steps of a successful Post exploitation phase.
Anonymity(Day17, Day18)
Penetration testers rarely need to cover their tracks. However there are times when testing the efficiency of the target organization incident response team is within the scope of a Penetration tester’s engagement.
Social Engineering(Day19, Day20)
Social engineering module will guide you through the most modern social engineering outgoing techniques. Real world outgoings will be illustrated by exploiting the potential of social Network such as Facebook, Spokeo or Twitter. Almost one hour of video lessons will teach you everything you need to know to master the most important tool in the field.
Pentesting With Metasploit(Day21, Day22)
In this module, the candidate will study the Metasploit architecture and the framework, and will learn how to create, add or modify custom Metasploit modules. Thanks to our virtual labs, the candidate will also have the chance to practice against real vulnerable machines.
Traffic Analysis(Day23, Day24)
After the target Networking has been identified, the next step is to configure our apps in order to sniff and intercept the traffic. This is a very important step for all the outgoings that come here after.
Outgoinging Wireless Networking(Day25, Day26)
The following module focuses on the outgoings that can be executed on Wireless Network. The candidate will learn how to outgoing and access remote Wireless Network, obtain keys, password and more, as per as to their configuration and security mechanism. We will first start exploring the outgoings against WEP and then focus our tests on more secure Network: WPA, WPA2 and WPS.
Wireless as an outgoing Vector(Day27, Day28)
In the last module, of the Wireless section, the candidate will learn how to use Wireless as an outgoing vector. It means that we will not outgoing Wireless Network, instead we will use Wireless in order to create fake Network, obtain credentials, run MitM outgoings and more
Write a public review