Penetration Testing Course for Students

Syllabus

eLearnSecurity s.r.l. – Via Carnelutti 11, 56124, Pisa, Italy | www.elearnsecurity.com

com . eLearnSecurity s. Pisa. A Lab module will allow the student to set up a lab environment with Backtrack 4 and a vulnerable virtual machine.The Penetration Testing Course for Student is divided into two main section: Preliminary Skills Penetration Testing Every chapter in the above sections contains:      Interactive slides (650) Video training (total 3 hours of video training) Self assessment quizzes Practical exercises (where possible) References and books for further studies All examples.l. – Via Carnelutti 11.elearnsecurity. videos and exercises are based on Backtrack 4. 56124. Italy | www.r.

Italy | www.3.r.3. Web Applications 1.1.3.2.3.1.1. Understanding the Penetration Testing Process 1.9.5. Preliminary Skills 1. 1.1.3. Networking 1. 1.3. 1. Vulnerability Assessment 1.1. 1. Nessus 1.7. 1.3.3. How penetration testers work 1.2.1.5.3.3.4.1.1.l.1.1.3.4.1.2.2.6. Technical Background 1. 1.2.1. Tools: 1.3. 1.1. 1.2.2.3.3.2.2.1. 1. 1. Pisa.3.1.1.3.9.3.2.9.3.3.1.3.2. – Via Carnelutti 11. 1. Packets IP Address Routing Forwarding ARP TCP UDP Firewalls Wireshark Wireshark configuration Exercises: Studying networking with Wireshark 1.1. 56124. HTTP Protocol basics Cookies Sessions Same Origin Study web applications and http with Burp Suite eLearnSecurity s.1.8.3.1. 1.1.elearnsecurity. 1. 1.1.com .2.

1.3. Open Source Information Gathering 2.2. 2.r.1.3.3.1. Mapping The Remote Network 2.1.6. Password Cracking 2. OS Fingerprinting with nmap 2.10.3.1.2.2.1.3. 2.1.3.com .14.3. 2.1. 2.1.3. XSS 2.3. 2.3.1.3.11.2. 2.3.3.1.3.3. Penetration Testing 2. Footprinting & Scanning 2. Pisa.elearnsecurity. 2.2.3.3. Attacks & Exploitation 2. Nmap 2.5.3. 2.1.4.1.13. Information Gathering 2.3.2. Malware 2. Port Scanning 2. 2.3.8.1. 2. 2.3.2.3.1.2.2.1. Italy | www.l.2. – Via Carnelutti 11.2.9.3. Finding vulnerable websites Reflected XSS Persistent and XSS Exploitation Virus Trojan Horses Rootkit Bootkit Backdoors Adware Spyware Greyware Dialer Key-logger Botnet Ransomware Data-Stealing Malware Worm 2.2.2. Brute Force Attack eLearnSecurity s.1.1.1.2. 2.3.3.1.3.1. 2.1. 2.7. 2.3. 2.3.1. 2. 56124.3.12.4.

2. 56124. Italy | www.3. Buffer Overflows 2.com .2.1. Understanding Buffer overflow and the stack Exploitation 2.2.2. – Via Carnelutti 11.3.3.3.5.3.3.8. 2. Fingerprinting Netcat HttpRecon 2.8. 2.l.5. 2. 2.3.3. 2.3.3.8.1. Enum.8.3.6 2. eLearnSecurity s.1.3.3. 2.3.2.r.3.5.7. Pisa.3.3. Winfo 2. Guide to Metasploit 3.elearnsecurity.5.2.2. Exploiting misconfigurations Finding hidden files Uploading PHP shells Using Google Hacking to discover hidden files 2.2. Understanding SQL injection Finding SQL injections in websites Retrieve data from remote databases through: Sqlninja sqlmap 2.4.3.3. SQL Injection 2. Web Servers 2. Breaking into Windows machines with Null Sessions 2.4.4.1.6.4.3.5. Exploiting Null Sessions with Linux tools 2.5.1.3.6. 2.2.5.3.3.3.3. Dictionary Attack Using Hydra and John the ripper to crack passwords 2.3.1.1.3. 2.3.2.6.3.8.8.1.1.1. Nbtstat. Exploiting Null Sessions with Windows tools Net.2. 2.3.3. 2.5.1.2. 2.

– Via Carnelutti 11.r. Italy | www. catering to Government bodies.com . Italy eLearnSecurity s.elearnsecurity.com contactus@elearnsecurity.l.eLearnSecurity Information Security Training Solutions eLearnSecurity is a global Information Technology Security Training Solutions provider. 56124.elearnsecurity. Website: E-mail: Phone: Address: http://www. Pisa. Educational Institutions and IT Security Professionals around the world.com +39 050 574113 Head Office Pisa.

Master your semester with Scribd & The New York Times

Special offer for students: Only $4.99/month.

Master your semester with Scribd & The New York Times

Cancel anytime.