Course Title: Hacking & Penetration Test for IT Administrator

“Aimed at people who are new to the world of hacking and penetration testing...”
Training Category:
Information Technology
Target Audience:
IT Administrator, System Engineers, Webmasters, CTOs, CIOs, IT heads and managers who are new to hacking and penetration test.
2 Days
Course Introduction ›
This is a 2-Day Hacking & Penetration Test training for IT Administrator. It targets on those IT professionals who are new to hacking and penetration test. This program helps to keep those with little to no experience on hacking and penetration test up to speed with the tools and methods offered by the trainer.

Course Objectives ›
At the end of this workshop, participant should be able to understand the following:

  • What is Penetration Testing?
  • Reconnaissance
  • Scanning
  • Exploitation
  • Social Engineering
  • Web-Based Exploitation
  • Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter
  • Writing Penetration Testing Report

Course Outline ›
Module 1: What is Penetration Testing?

  • Introduction to Kali 1.0.8 Linux
  • Working with Your Attack Machine
  • Hacking Lab
  • Penetration Test Methodology

Module 2: Reconnaissance

  • Website Copier
  • Practicing Your Google-Fu
  • Discovering and Leveraging E-mail Addresses
  • Whois
  • Netcraft
  • Host
  • Extracting Information from DNS
  • Extracting Information From E-mail Servers
  • MetaGooFil
  • Attack of the Drones
  • Social Engineering
  • Sifting through the Intel to Finding Attackable Targets

Module 3: Scanning

  • Pings and Ping Sweeps
  • Port Scanning and Service Detection
  • Vulnerability Scanning

Module 4: Exploitation

  • Gaining Access to Remote Services
  • Metasploit
  • John the Ripper
  • Password Resetting
  • Sniffing Network Traffic
  • Macof
  • Armitage

Module 5: Social Engineering

  • The Basics of SET
  • Website Attack Vectors
  • The Credential Harvester

Module 6: Web-Based Exploitation

  • The Basics of Web Hacking
  • Interrogating Web Servers
  • Crawling Your Target's Website
  • Intercepting Web Requests
  • Code Injection Attacks
  • Cross-Site Scripting: Browsers that Trust Sites

Module 7: Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter

  • Netcat
  • Cryptcat: Netcat's Cryptic Cousin
  • Rootkits
  • Hacker Defender
  • Detecting and Defending Against Rootkits
  • Meterpreter

Module 8: Wrapping Up the Penetration

  • Writing the Penetration Testing Report

Contact us now

  • Course content customization
  • In-house training request
  • Available public program
  • Consultation service Course