fbpx

Networks & Security

IT Sharks has many high quality courses available across 12 distinct categories. All our courses are self-paced and have been designed by subject matter experts, to give you an interactive and enriched learning experience.Depending on your learning goal, which help you focus your learning to provide you with specific expertise in your field or industry.

CEH Diploma
Free
Network and Security

CEH Diploma

OS Basic

- Kali Linux
- Terminal commands
- bash scripting
- Installing & Updating Tools
- CMD commands

Lab 1

- writing bash script to make an automatic backup.

Network Basic

- IP addresses
- TCP and UDP
- OSI model
- Subnetting
- ports and protocols and DNS
- IDS, IPS and Firewalls
- Router, Switch and Hub

Lab 2

- Network packets analysis.
-Scanning the network for live machines with bash scripting.

Cyber security introduction

- What is Cybersecurity.
-Cybersecurity History.
-Threat, Vulnerability, and Risk
- CIA Trails (Confidentiality , Integrity, Availability).
- Cybersecurity teams (Red Team vs Blue Team and other Cybersecurity teams).
- Penetration testing ,Vulnerability assessment and Risk Assessment
-Cyber Security Terminology
-Types of Malware.

The Ethical Hacker Methodology

- Information Gathering (Reconnaissance)
- Scanning & Enumeration
- Exploitation
- Post Exploitation

Information Gathering (Reconnaissance)

- active Information Gathering.
- passive Information Gathering.
- Information Gathering tools.

Lab 3

- Discover target IP addresses, Subnet, physical location, phone number, emails, employee names and more.
- Discover target DNS, MX records and more.

Scanning & Enumeration

-Scanning network Subnet and IPs.
- Discover open ports and protocols.
- Discover Running services and its versions.
- DNS Enumeration.
- SMB and netBios Enumeration.

Lab 4

- Scanning the network and get full Information about its port protocols and Running services.
- Discover network Running services Vulnerabilities.

Exploitation Basics

- Metasploit.
- MSFconsole.
- Exploit modules.
- Auxiliary modules.
- Payload modules.
- Meterpreter.

Lab 5

- using the previous discovered Vulnerabilities and gain access to the system.
- take screenshots, steal files, inject files and more to the victim machine.

Post Exploitation

- Metasploit.
- Post-exploitation modules.
- privilage sclaltion.

Lab 6

- Try to inject a back door and gain administrator access.

Web Application

- What is web Application.
- Scanning and Enumeration Web Application.
- Find out the Ports.
- Well Known Files.
- Web Directories discovery.
- Subdomains.
- Web Technologies used.

Lab 7

- Discover web app IPs and Subdomains.
- Discover open ports and its Running services.
- Discover Hidden folders and directories.
- Enumerate the web Application Vulnerabilities.

Web Application Vulnerabilities

- XXS.
- SQL injection.
- CSRF.
- Cross-Origin Resource Sharing (CORS) Policy.
- open redirect.
- Operating System (OS) command injection.
- Sensitive data exposure.
- Unrestricted File Upload.
- wordpress attacks.

Lab 8

- lab for every topic

Wireless Penetration Testing

- the basics of WLANs.
- bypassing the WLAN authentication.
- capture the handshake encrypted key.
- Cracking WLAN encryption.

Lab 9

- Attacking wireless network and gain access by cracking its encrypted handshake.

encryption

- Hashing vs encryption
- Symmetric encryption
- Asymmetric encryption
- Digital Signature and certificates

Report Writing

- how to document every Vulnerability you found.
- show the impact for each Vulnerability.
- Suggest a patch or fix or the discovered Vulnerabilities.

capture the flag (CTF)

- This will be a good practice for every topic we discussed during the course.
- the one how will get the flag will win the competition.

Short Description

Duration: 60 Hours

Apply for this course

Please type your full name.
Invalid Input
Invalid email address.
Invalid Input

Connect with us

Villa No. 48, 2nd Floor, Flat 6, 105th Street, El Horreya Sq., Beside El Raya Market, Maadi - Cairo, Egypt 11728

  • Mobile+20 1112 50 5953

  • Whatsapp+20 101 774 3315

  • Email info@itsharks.co

Newsletter

Enter your email and we'll send you more information

© 2024 Copyright IT Sharks. All Rights Reserved.

Search