The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription

The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription


Overview

Information security professionals play a smart role to protect the corporate technology world, however, cyber criminals are even smarter.That is why you hear news of hackers compromising large enterprises including vendors who provide information security services & products. A group of individual computers, or any device that can have an Internet Address (IP), is considered a network device regardless of the work this device performs, this is the general concept. This normally includes the following devices or systems but is not limited to:

    • Servers
    • Routers
    • Switches
    • Firewalls
    • Mobile Devices
    • Printing Devices
    • Wireless Devices
    • Personal Computers (PC)
    • Intrusion Detection Systems
    • Intrusion Prevention Systems
    • Network Attached Storage Devices

Such devices are considered Network Devices. In this workshop, you will gain experience in attacking network devices. However, it would be difficult to cover all of these devices in one workshop but we will cover as much as we can. You must have these devices running in your lab or you should have authorization to perform such attacks in order to evaluate the security blueprint of the network you are attacking. But, this is not possible for all of our readers, so we will also help you to setup your own virtual home lab in which you can run more of these devices which will help you to develop your security testing skills and gain more hands-on experience.

Certificate of completion, 1 CPE credit


You should know

You should have prior knowledge of the following technologies to get the most out of this workshop, however, we will maintain a pace in such a way that will cover all levels of students to an extent they can understand easily.

    • Understanding of TCP/IP
    • Knowledge of OSI Model
    • Minimum Beginner Level Knowledge of Cisco Devices
    • Minimum Knowledge of Operating Systems (Windows, Linux)

 You Will Learn

This course is designed in such a way that will help you understand the overall mechanism of how hackers can attack network devices and gain illegitimate access, increase your knowledge about Kali Linux and, most importantly, you will learn the broader picture of how a corporate network can be hacked by the hackers.

Security is only as strong as the weakest link in your network.”  


Who should take this course?

This would be a good start for people who have networking knowledge and have some concepts of information security but don’t have any experience in ethical hacking or penetration testing.

Key Audience

    • Network Administrators
    • Information Security Officers
    • New Graduates in IT
    • Newbies who want to learn hacking

  What Students should bring

    • Internet connection
    • One PC, which can run 2-3 Virtual Machines
    • Guided Lab development will be covered in the workshop

 Instructor

Raheel Ahmad is an information security professional and an experienced instructor and penetration tester with a computer graduate degree and holds 10 years of professional experience working for Big4 and boutique consulting companies. He holds industry recognized certifications, including CISSP, CEH, CEI, MCP, MCT, CobIT, and CRISC. Raheel is a founder of 26SecureLabs, a management consulting company based in Auckland, New Zealand. 26SecureLabs provides ethical hacking and penetration testing services as its core business. Best way to reach [email protected]


Course format


    • The course is self-paced – you can visit the training whenever you want and your content will be there.
    • Once you’re in, you keep access forever, even when you finish the course. 
    • There are no deadlines, except for the ones you set for yourself. 

Syllabus


Module 1

Well Known Vendors in Networking

    • Tutorial 1 – Core Principles
    • Topic – Top Players in Internetworking
    • Topic – Core Internetworking Devices
    • Topic – Vulnerabilities Lookup from Famous Exploit – DB.com
    • Case Study – Cisco Security Advisories  

Module 2

 Security Testing of Internetworking Operating System

    • Tutorial 1 – The Home Lab
    • Topic – Recommended Lab Setup
    • Topic – GNS3 Configuration
    • Exercise 1 – Discovering network Tools Required  

Module 3

Walkthroughs on Hacking Network Devices

    • Tutorial 1 – Attack Methodology
    • Case Study: Walkthrough of Network Attack  

Module 4

Evading Firewalls and Intrusion Detection Systems

    • Tutorial 1 – Understanding Firewalls and IDS
    • Tutorial 2 – Fire-walking Case Study: Methods of Detection intrusion  

Module 5

Workshop eBook 


Final Exam 

Course Reviews

5

5
1 ratings
  • 5 stars1
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0
  1. Nice virtual lab

    5

    Nice virtual lab tool
    Didnt know about it

TAKE THIS COURSE
  • Premium Subscription Only
  • UNLIMITED ACCESS
  • Course Certificate
835 STUDENTS ENROLLED

Who’s Online

There are no users currently online

Certificate Code

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013