Hacking 101

1 Day

This 1-day course will teach you the foundations of penetration testing and how to find and exploit vulnerabilities within different technologies. This introductory course will train attendees in understanding penetration testing, and provide background information, risks and vulnerabilities associated with different systems and provide insight to how the mindset of a hacker works. Students will also get access to an online training environment platform which will be used to practice the concepts taught during the course.

HOW TO BOOK

Class Overview

Attendees will gain understanding in the following topics:
Understand different network topologies and addressing schemes
Understand the properties and security of common network protocols and thenetwork protocol stacks.
How to fingerprint, enumerate and exploit common windows and linux
misconfigurations and vulnerabilities.
Differentiate between types of wireless standards and understand the benefits andrisks associated with these standards.
How to exploit common web application security flaws.

Class Details

Module 1. Hacking Fundamentals

Hacking History 101
Hacking in 2018
CIA Triad
Art of Hacking methodology
Introduction to Kali Linux

Module 2. Network Security

Network Fundamentals
MAC Addressing and Network Addressing
Introduction to Port addressing
Understanding the OSI Layer and TCP/IP Model
Domain Name System (DNS) Attack Surface
TCP vs UDP
Network Scanning
Shodan

Module 3. Linux Security

Introduction to Linux
Linux Filesystem Hierarchy
Linux File Permissions
Berkeley Rsh/Rlogin Services
Network File System (NFS) Security
Missing Security Patches
Vulnerability Identification
Case Study: Shellshock
Introduction to Metasploit

Module 4. Windows Security

Windows Fundamentals
Windows Password Hashing
Workgroups vs Domains
Windows Authentication
Windows Exploitation 101
Client-Side attacks
Case Study: WannaCry

Module 5. Hacking CMS Software

Introduction to Content Management Systems
Enumerating CMS Platforms
Hacking WordPress
Joomla Exploitation

Module 6. Web Security

HTTP Protocol Basics
Understanding Web Application Attack Surface
SQL Injection
Case Study: T alkT alk SQL Injection
Command Injection
Cross-Site Scripting (XSS)
Open Redirect

Module 7. Wireless Security

WiFi Security 101
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA)
WPA2 Security
Wi-Fi Protected Setup (WPS) flaws
Rogue Access Points Attacks

Prerequisites

Who Should Take This Class?

System administrators, Web Developers, IT Managers, Security enthusiasts, Anyone interested in Penetration testing and ethical hacking. (No prior experience is required to take this course)

Hacking Training Classes

Lab-Based Training - Written by BlackHat Trainers - Available Globally

NotSoSecure classes are ideal for those preparing for CREST CCT (ICE), CREST CCT (ACE), CHECK (CTL), TIGER SST and other similar industry certifications, as well as those who perform Penetration Testing on infrastructure / web applications as a day job & wish to add to their existing skill set.


Download the NotSoSecure Hacking Classes Brochure

Beginner Friendly

Hacking 101

The Art of Hacking

The Art of Hacking

=

Infrastructure Hacking

+

Web Hacking

Other Specialist Classes

Advanced Infrastructure Hacking

Advanced Web Hacking

AppSec for Developers

Book Your Training

Working exclusively with 3 training delivery partners, NotSoSecure Hacking Training is available around the world.


UNITED KINGDOM

REST OF THE WORLD