Network Hacking - aka NT Pen-Testing
Network Hacking - aka NT Pen-Testing
Day 1: Introduction to penetration testing and methodology
- Understanding of common vulnerability exposure
- Information gathering (know your target)
- Network discovery – ping sweep
- Working with Nmap
- (End of the Excersie)
Day 2: exploitation Framework
- Introduction to Kali Linux
- Overview about buffer overflow.
- Working with Metasploit framework and payloads types
- Exercises
Day 3: Famous web application attack
- Sql injection
- Remote command Execution & code injection
- Unrestricted file upload
Day 4: Exploiting Services and misconfiguration
- Outdated services and common cve
- Default credentials
- Null session
Day 1: Introduction to penetration testing and methodology
- Understanding of common vulnerability exposure
- Information gathering (know your target)
- Network discovery – ping sweep
- Working with Nmap
- (End of the Excersie)
Day 2: exploitation Framework
- Introduction to Kali Linux
- Overview about buffer overflow.
- Working with Metasploit framework and payloads types
- Exercises
Day 3: Famous web application attack
- Sql injection
- Remote command Execution & code injection
- Unrestricted file upload
Day 4: Exploiting Services and misconfiguration
- Outdated services and common cve
- Default credentials
- Null session
Timing | Location | Price | Student Price | Online Price | Trainer | Registeration Status | Feedback |
---|---|---|---|---|---|---|---|
مسائية من الساعة 4 عصراً وحتى الساعة 9 مساءاً | مركز التميز لأمن المعلومات - كلمة علوم الحاسب - جامعة الملك سعود | 1495.00 | 695.00 | 495.00 | Dr. Waleed Mohammad | Registeration is closed | Feedback is closed |
مسائية من الساعة 4 عصراً وحتى 9 مساءاً | Fahad Crawn Hotel | 1999.00 | 999.00 | 999.00 | Ali Bawazeer | Registeration is closed | Feedback is closed |
Speaker Language | Arabic |
---|---|
Content Language | Englsih |
Target Users | مسؤولي و مشغلي أنظمة الشبكات. 2.مختصي تقنية المعلومات. 3. مدققي أمن المعلومات. 4. الفنيين المهتمين بأمن المعلومات. 5.مستخدمي أنظمة الشبكات. 6. المهتمين بطرق اختبار الاختراق |
Duration | 5 Days |
- معرفة بأساسيات عمل الشبكات و بروتوكولات TCP / IP. - معرفة بنظام لينيكس
Information Security Consultant