OS Basic
- Kali LinuxLab 1
- writing bash script to make an automatic backup.Network Basic
- IP addressesLab 2
- Network packets analysis. -Scanning the network for live machines with bash scripting.Cyber security introduction
- What is Cybersecurity.The Ethical Hacker Methodology
- Information Gathering (Reconnaissance)Information Gathering (Reconnaissance)
- active Information Gathering.Lab 3
- Discover target IP addresses, Subnet, physical location, phone number, emails, employee names and more.Scanning & Enumeration
-Scanning network Subnet and IPs.Lab 4
- Scanning the network and get full Information about its port protocols and Running services.Exploitation Basics
- Metasploit.Lab 5
- using the previous discovered Vulnerabilities and gain access to the system. - take screenshots, steal files, inject files and more to the victim machine.Post Exploitation
- Metasploit.Lab 6
- Try to inject a back door and gain administrator access.Web Application
- What is web Application.Lab 7
- Discover web app IPs and Subdomains.Web Application Vulnerabilities
- XXS.Lab 8
- lab for every topicWireless Penetration Testing
- the basics of WLANs.Lab 9
- Attacking wireless network and gain access by cracking its encrypted handshake.encryption
- Hashing vs encryptionReport Writing
- how to document every Vulnerability you found.capture the flag (CTF)
- This will be a good practice for every topic we discussed during the course.Duration: 60 Hours
Villa No. 48, 2nd Floor, Flat 6, 105th Street, El Horreya Sq., Beside El Raya Market, Maadi - Cairo, Egypt 11728
Mobile+20 1112 50 5953
Whatsapp+20 101 774 3315
Email info@itsharks.co