Network Hacking - aka NT Pen-Testing


Day 1: Introduction to penetration testing and methodology
- Understanding of common vulnerability exposure
- Information gathering (know your target)
- Network discovery – ping sweep
- Working with Nmap
- (End of the Excersie)
Day 2: exploitation Framework
- Introduction to Kali Linux
- Overview about buffer overflow.
- Working with Metasploit framework and payloads types
- Exercises
Day 3: Famous web application attack
- Sql injection
- Remote command Execution & code injection
- Unrestricted file upload
Day 4: Exploiting Services and misconfiguration
- Outdated services and common cve
- Default credentials
- Null session

Day 1: Introduction to penetration testing and methodology
- Understanding of common vulnerability exposure
- Information gathering (know your target)
- Network discovery – ping sweep
- Working with Nmap
- (End of the Excersie)
Day 2: exploitation Framework
- Introduction to Kali Linux
- Overview about buffer overflow.
- Working with Metasploit framework and payloads types
- Exercises
Day 3: Famous web application attack
- Sql injection
- Remote command Execution & code injection
- Unrestricted file upload
Day 4: Exploiting Services and misconfiguration
- Outdated services and common cve
- Default credentials
- Null session

Timing Location Price Student Price Online Price Trainer Registeration Status Feedback
مسائية من الساعة 4 عصراً وحتى الساعة 9 مساءاً مركز التميز لأمن المعلومات - كلمة علوم الحاسب - جامعة الملك سعود 1495.00 695.00 495.00 Dr. Waleed Mohammad Registeration is closed Feedback is closed
مسائية من الساعة 4 عصراً وحتى 9 مساءاً Fahad Crawn Hotel 1999.00 999.00 999.00 Ali Bawazeer Registeration is closed Feedback is closed
Speaker Language Arabic
Content Language Englsih
Target Users مسؤولي و مشغلي أنظمة الشبكات. 2.مختصي تقنية المعلومات. 3. مدققي أمن المعلومات. 4. الفنيين المهتمين بأمن المعلومات. 5.مستخدمي أنظمة الشبكات. 6. المهتمين بطرق اختبار الاختراق
Duration 5 Days

- معرفة بأساسيات عمل الشبكات و بروتوكولات TCP / IP. - معرفة بنظام لينيكس

  • Dr. Waleed Mohammad
    5.00 out of 5

  • Ali Bawazeer
    5.00 out of 5

    Information Security Consultant