The courses below were all published in 2015 or earlier. While we stand by pubishing them then, we’ve grown so much since. We recognize that these workshops don’t exactly meet our standards, as we understand them today.
All classes are available within our premium membership, and have adjusted CPE awards to reflect their respective contents. If you join, please keep in mind that some of the information inside might be outdated or not relevant. We’ll be adding notes at the beginning of each course to let you know what’s worth checking out in each!
The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription
Information security professionals play a smart role to protect the corporate technology world, however, cyber criminals are even smarter.That is why you hear news of hackers compromising large enterprises including vendors who provide information security services & products. A group of individual computers, or any device that can have an Internet Address (IP), is considered a network device regardless of the work this device performs, this is the general concept. This normally includes the following devices or systems but is not limited to:
- Mobile Devices
- Printing Devices
- Wireless Devices
- Personal Computers (PC)
- Intrusion Detection Systems
- Intrusion Prevention Systems
- Network Attached Storage Devices
Such devices are considered Network Devices. In this workshop, you will gain experience in attacking network devices. However, it would be difficult to cover all of these devices in one workshop but we will cover as much as we can. You must have these devices running in your lab or you should have authorization to perform such attacks in order to evaluate the security blueprint of the network you are attacking. But, this is not possible for all of our readers, so we will also help you to setup your own virtual home lab in which you can run more of these devices which will help you to develop your security testing skills and gain more hands-on experience.
Certificate of completion, 1 CPE credit
You should know
You should have prior knowledge of the following technologies to get the most out of this workshop, however, we will maintain a pace in such a way that will cover all levels of students to an extent they can understand easily.
- Understanding of TCP/IP
- Knowledge of OSI Model
- Minimum Beginner Level Knowledge of Cisco Devices
- Minimum Knowledge of Operating Systems (Windows, Linux)
You Will Learn
This course is designed in such a way that will help you understand the overall mechanism of how hackers can attack network devices and gain illegitimate access, increase your knowledge about Kali Linux and, most importantly, you will learn the broader picture of how a corporate network can be hacked by the hackers.
“Security is only as strong as the weakest link in your network.”
Who should take this course?
This would be a good start for people who have networking knowledge and have some concepts of information security but don’t have any experience in ethical hacking or penetration testing.
- Network Administrators
- Information Security Officers
- New Graduates in IT
- Newbies who want to learn hacking
What Students should bring
- Internet connection
- One PC, which can run 2-3 Virtual Machines
- Guided Lab development will be covered in the workshop
Raheel Ahmad is an information security professional and an experienced instructor and penetration tester with a computer graduate degree and holds 10 years of professional experience working for Big4 and boutique consulting companies. He holds industry recognized certifications, including CISSP, CEH, CEI, MCP, MCT, CobIT, and CRISC. Raheel is a founder of 26SecureLabs, a management consulting company based in Auckland, New Zealand. 26SecureLabs provides ethical hacking and penetration testing services as its core business. Best way to reach [email protected]
- The course is self-paced – you can visit the training whenever you want and your content will be there.
- Once you’re in, you keep access forever, even when you finish the course.
- There are no deadlines, except for the ones you set for yourself.
Well Known Vendors in Networking
- Tutorial 1 – Core Principles
- Topic - Top Players in Internetworking
- Topic - Core Internetworking Devices
- Topic – Vulnerabilities Lookup from Famous Exploit – DB.com
- Case Study – Cisco Security Advisories
Security Testing of Internetworking Operating System
- Tutorial 1 – The Home Lab
- Topic - Recommended Lab Setup
- Topic – GNS3 Configuration
- Exercise 1 – Discovering network Tools Required
Walkthroughs on Hacking Network Devices
- Tutorial 1 – Attack Methodology
- Case Study: Walkthrough of Network Attack
Evading Firewalls and Intrusion Detection Systems
- Tutorial 1 - Understanding Firewalls and IDS
- Tutorial 2 – Fire-walking Case Study: Methods of Detection intrusion