The access to this courses is restricted to Hakin9 Premium or IT Pack Premium Subscription
Information security professionals play a smart role to protect the corporate technology world, however, cyber criminals are even smarter.That is why you hear news of hackers compromising large enterprises including vendors who provide information security services & products. A group of individual computers, or any device that can have an Internet Address (IP), is considered a network device regardless of the work this device performs, this is the general concept. This normally includes the following devices or systems but is not limited to:
Personal Computers (PC)
Intrusion Detection Systems
Intrusion Prevention Systems
Network Attached Storage Devices
Such devices are considered Network Devices. In this workshop, you will gain experience in attacking network devices. However, it would be difficult to cover all of these devices in one workshop but we will cover as much as we can. You must have these devices running in your lab or you should have authorization to perform such attacks in order to evaluate the security blueprint of the network you are attacking. But, this is not possible for all of our readers, so we will also help you to setup your own virtual home lab in which you can run more of these devices which will help you to develop your security testing skills and gain more hands-on experience.
You should know
You should have prior knowledge of the following technologies to get the most out of this workshop, however, we will maintain a pace in such a way that will cover all levels of students to an extent they can understand easily.
Understanding of TCP/IP
Knowledge of OSI Model
Minimum Beginner Level Knowledge of Cisco Devices
Minimum Knowledge of Operating Systems (Windows, Linux)
You Will Learn
This course is designed in such a way that will help you understand the overall mechanism of how hackers can attack network devices and gain illegitimate access, increase your knowledge about Kali Linux and, most importantly, you will learn the broader picture of how a corporate network can be hacked by the hackers.
“Security is only as strong as the weakest link in your network.”
Who should take this course?
This would be a good start for people who have networking knowledge and have some concepts of information security but don’t have any experience in ethical hacking or penetration testing. Key Audience
Information Security Officers
New Graduates in IT
Newbies, who want to learn hacking
What Students should bring
One PC, which can run 2-3 Virtual Machines
Guided Lab development will be covered in the workshop
Raheel Ahmad is an information security professional and an experienced instructor and penetration tester with a computer graduate degree and holds 10 years of professional experience working for Big4 and boutique consulting companies. He holds industry recognized certifications, including CISSP, CEH, CEI, MCP, MCT, CobIT, and CRISC. Raheel is a founder of 26SecureLabs, a management consulting company based in Auckland, New Zealand. 26SecureLabs provides ethical hacking and penetration testing services as its core business. Best way to [email protected]
The course is self-paced – you can visit the training whenever you want and your content will be there.
Once you’re in, you keep access forever, even when you finish the course.
There are no deadlines, except for the ones you set for yourself.
Well Known Vendors in Networking
Tutorial 1 – Core Principles
Topic – Top Players in Internetworking
Topic – Core Internetworking Devices
Topic – Vulnerabilities Lookup from Famous Exploit – DB.com
Case Study – Cisco Security Advisories
Security Testing of Internetworking Operating System
Tutorial 1 – The Home Lab
Topic – Recommended Lab Setup
Topic – GNS3 Configuration
Exercise 1 – Discovering network Tools Required
Walkthroughs on Hacking Network Devices
Tutorial 1 – Attack Methodology
Case Study: Walkthrough of Network Attack
Evading Firewalls and Intrusion Detection Systems
Tutorial 1 – Understanding Firewalls and IDS
Tutorial 2 – Fire-walking Case Study: Methods of Detection intrusion