Attacking Network Devices (W18)

$79.00

Out of stock

The access to this courses is restricted to Hakin9 Premium or IT Pack Premium Subscription


Overview

Information security professionals play a smart role to protect the corporate technology world, however, cyber criminals are even smarter.That is why you hear news of hackers compromising large enterprises including vendors who provide information security services & products. A group of individual computers, or any device that can have an Internet Address (IP), is considered a network device regardless of the work this device performs, this is the general concept. This normally includes the following devices or systems but is not limited to:

    • Servers


    • Routers


    • Switches


    • Firewalls


    • Mobile Devices


    • Printing Devices


    • Wireless Devices


    • Personal Computers (PC)


    • Intrusion Detection Systems


    • Intrusion Prevention Systems


    • Network Attached Storage Devices


Such devices are considered Network Devices. In this workshop, you will gain experience in attacking network devices. However, it would be difficult to cover all of these devices in one workshop but we will cover as much as we can. You must have these devices running in your lab or you should have authorization to perform such attacks in order to evaluate the security blueprint of the network you are attacking. But, this is not possible for all of our readers, so we will also help you to setup your own virtual home lab in which you can run more of these devices which will help you to develop your security testing skills and gain more hands-on experience.


You should know


You should have prior knowledge of the following technologies to get the most out of this workshop, however, we will maintain a pace in such a way that will cover all levels of students to an extent they can understand easily.

    • Understanding of TCP/IP


    • Knowledge of OSI Model


    • Minimum Beginner Level Knowledge of Cisco Devices


    • Minimum Knowledge of Operating Systems (Windows, Linux)



 You Will Learn


This course is designed in such a way that will help you understand the overall mechanism of how hackers can attack network devices and gain illegitimate access, increase your knowledge about Kali Linux and, most importantly, you will learn the broader picture of how a corporate network can be hacked by the hackers.

Security is only as strong as the weakest link in your network.”


Who should take this course?

This would be a good start for people who have networking knowledge and have some concepts of information security but don’t have any experience in ethical hacking or penetration testing.   Key Audience

    • Network Administrators


    • Information Security Officers


    • New Graduates in IT


    • Newbies, who want to learn hacking


  What Students should bring

    • Internet connection


    • One PC, which can run 2-3 Virtual Machines


    • Guided Lab development will be covered in the workshop



 Instructor


Raheel Ahmad is an information security professional and an experienced instructor and penetration tester with a computer graduate degree and holds 10 years of professional experience working for Big4 and boutique consulting companies. He holds industry recognized certifications, including CISSP, CEH, CEI, MCP, MCT, CobIT, and CRISC. Raheel is a founder of 26SecureLabs, a management consulting company based in Auckland, New Zealand. 26SecureLabs provides ethical hacking and penetration testing services as its core business. Best way to [email protected]


Course format


    • The course is self-paced – you can visit the training whenever you want and your content will be there.


    • Once you’re in, you keep access forever, even when you finish the course.


    • There are no deadlines, except for the ones you set for yourself.



Syllabus


Module 1

Well Known Vendors in Networking


 

    • Tutorial 1 – Core Principles


    • Topic – Top Players in Internetworking


    • Topic – Core Internetworking Devices


    • Topic – Vulnerabilities Lookup from Famous Exploit – DB.com


    • Case Study – Cisco Security Advisories



Module 2

 Security Testing of Internetworking Operating System


 

    • Tutorial 1 – The Home Lab


    • Topic – Recommended Lab Setup


    • Topic – GNS3 Configuration


    • Exercise 1 – Discovering network Tools Required



Module 3

Walkthroughs on Hacking Network Devices


 

    • Tutorial 1 – Attack Methodology


    • Case Study: Walkthrough of Network Attack



Module 4

Evading Firewalls and Intrusion Detection Systems


 

    • Tutorial 1 – Understanding Firewalls and IDS


    • Tutorial 2 – Fire-walking Case Study: Methods of Detection intrusion



Module 5

Workshop eBook 


Final Exam 

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013