Claranet cyber security

Hacking training 101

1 day hacking introduction class

Hacking 101 is a part of our Hacking Training courses and provides a foundation to hacking for beginners. It is built to train professionals in the realm of penetration testing.

  • Overview
  • Details
  • Pre-requisites & Audience
  • Brochure Download

Outline of the course:

The ideal introduction to ethical hacking for novices. Begin your journey with proven hacking techniques. You will become familiar with the risks and vulnerabilities of corporate networks.

Learning objectives:

  • Systems
  • Networks
  • Web
  • Applications
  • Reverse software engineering

Length of course and location:

A one day course that can be delivered remotely.

Additional accreditation:

Check Point Certified Penetration Testing Associate (CCPA).

Attendees learn about the following topics:

  • Different network topologies and addressing schemes
  • The properties and security of common network protocols and the network protocol stacks.
  • How to fingerprint, enumerate and exploit common windows and linux misconfigurations and vulnerabilities.
  • Differentiate between types of wireless standards and understand the benefits and risks associated
  • How to exploit common web application security flaws.

Module 1. Hacking fundamental

  • Hacking history 101
  • Hacking in 2018
  • CIA Triad
  • Art of Hacking methodology
  • Introduction to Kali Linux

Module 2. Network security

  • Network Fundamentals
  • MAC Addressing and Network Addressing
  • Introduction to Port addressing
  • Understanding the OSI Layer and TCP/IP Model
  • Domain Name System (DNS)
  • Attack Surface
  • TCP vs UDP
  • Network Scanning
  • Shodan

Module 3. Linux security

  • Introduction to Linux
  • Linux Filesystem Hierarchy
  • Linux File Permissions
  • Berkeley Rsh/Rlogin Services
  • Network File System (NFS)
  • Security
  • Missing Security Patches
  • Vulnerability Identification
  • Case Study: Shellshock
  • Introduction to Metasploit

Module 4. Windows security

  • Windows Fundamentals
  • Windows Password Hashing
  • Workgroups vs Domains
  • Windows Authentication
  • Windows Exploitation 101
  • Client-Side attacks Case Study: WannaCry

Module 5. Hacking CMS software

  • Introduction to Content Management Systems
  • Enumerating CMS Platforms
  • Hacking WordPress
  • Joomla Exploitation

Module 6. Web security

  • HTTP Protocol Basics
  • Understanding Web Application
  • Attack Surface
  • SQL Injection
  • Case Study: T alkT alk
  • SQL Injection
  • Command Injection
  • Cross-Site Scripting (XSS)
  • Open Redirect

Module 7. Wireless security

  • WiFi Security 101
  • Wired Equivalent Privacy (WEP)
  • Wi-Fi Protected Access (WPA)
  • WPA2 Security
  • Wi-Fi Protected Setup (WPS)
  • Flaws
  • Rogue Access Points Attack

Audience

Students with a background in programming and networking. No pre-existing knowledge is required, as you will become familiar with scanning, testing and hacking networks.

Setup

No setup and no VPN required. Delegates should bring their own laptop with Windows OS installed (either natively or running a VM) with admin access to perform tasks e.g.installing software, disabling anti-virus etc. Devices that don’t have an Ethernet connection (e.g. MacBook Air, tablets etc.) are not supported.

Book your training

Working exclusively with 3 training delivery partners, Claranet hacking training is available around the world.

Enroll today

Other courses part of our ethical Hacking Training

Lab-based training - written by BlackHat trainers.

Classes are ideal for those preparing for CREST CCT (ICE), CREST CCT (ACE), CHECK (CTL), TIGER SST and other similar industry certifications, as well as those who perform penetration testing on infrastructure / web applications as a day job and wish to add to their existing skill set.