3 Day(s)


This course is designed to show delegates some of the most popular tools available for stress testing their own network infrastructure. It also demonstrates how attackers could penetrate a system with the use of the very same tools.

Delegates will learn about the multitude of ways an attacker can gather preliminary information about a target network and by doing so will make delegates aware of the things they need to do to make this information harder for an attacker to obtain.

On a practical scale, delegates will learn how to use Wireshark to analyse network traffic to look for problematic areas - to spot rogue devices communicating, to see if data can be eavesdropped, to see if spurious data is entering the network and much more.

Delegates will also learn how to use Nmap to scan for potential vulnerabilities on their systems and then learn how rectify any issues found.

With the use of Kali (The world's most popular penetration testing tool) delegates will experience some of the tools used in analysing networks and machines to expose vulnerable systems.

A mixture of Instructor-led presentations and hands-on exercises will allow delegates to fully understand the nature and complexity that is network stress testing.

Skills Gained

At the conclusion of this course delegates will have an understanding of the processes and tools involved in stress testing a network to gauge how secure it is. Delegates will learn how to use Wireshark to examine the data flowing across their network and be able to identify troublesome systems. The use of tools such as Nmap will be examined that allow people to scan systems for possible weaknesses and tools within the Kali penetration testing program will be explored to show how other vulnerabilities can be detected and potentially exploited.


This course is aimed at existing system administrators who would like to be able to perform analysis of their own networks; as such a good working knowledge of Windows, Linux and networking principles is a must to understand many of the topics covered within this course. The course will utilise a number of virtual machine environments running both Linux and Windows operating systems, so a familiarity with working in virtual environments is also desired.

Course Specifics

Course Outline

Module 1 - Introduction to Information Security

This module looks at the basics of Information Security, IT security and Information Assurance and identifies the basic steps companies should be covering when looking at keeping their networks and systems safe.

Module 2 - Legalities

This module highlights the legal issues that should be addressed before anyone attempts to do any form of network security stress testing. The tools used can potentially expose sensitive data, or even damage systems and so all legal issues should be identified and approved first.

Module 3 - Understanding Vulnerabilities, Exploits and Malware

This module will uncover how vulnerabilities are identified and categorised, but also where the source code for many vulnerabilities can be found to help you test them against systems on your network. By using tools such as "the" or "Metasploit", administrators can run exploits against their own systems to see if security measures in place defend against such attacks.

Module 4 - Understanding how attacks happen

In this module, delegates will discover the many ways in which an attacker will scope-out a potential target, from OSINT, through Social Engineering, Phishing, dumpster diving and much more; an attacker will build a complex map of useful information to use in the actual attack. By knowing what sort of data an attacker looks for, companies can be more selective of the data they divulge or dispose of.

Module 5 - Tools that hackers use

This module introduces the stress testing tools used within the course. Whilst these tools are designed for system administrators for exactly this purpose, they are also the very same tools attackers & hackers use to attempt to break-down the security implementations in place. Tools such as Wireshark, Nmap and Kali will be introduced here.

Module 6 - Using Wireshark

This module concentrates on how to use Wireshark to analyse data that passes through a network. It looks at the capabilities as well as the limitations of the product and how to use it to build a picture of normal data conditions which can be compared against suspect data patterns to see if a compromise has occurred.

Module 7 - Using Nmap

This module will explore the features available within Nmap and its ability to identify potential weaknesses within a network.

Module 8 - Using Kali

This module looks at the system that is Kali and some of the hundreds of tools available within. From vulnerability assessments, through to exploitation capabilities, Kali has it all. This course will highlight some of the more useful aspects of Kali when stress testing a network and its associated systems.

Module 9 - Using Metasploit

In this module, delegates will experience how the Metasploit framework links in with the website to create possibly the world's best stress testing utility. Delegates will experience first-hand how to compromise a vulnerable machine and then how to stop such attacks from happening.

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. It's a cost effective option.

Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.