This course is designed to show delegates some of the most popular tools available for stress testing their own network infrastructure. It also demonstrates how attackers could penetrate a system with the use of the very same tools.
Delegates will learn about the multitude of ways an attacker can gather preliminary information about a target network and by doing so will make delegates aware of the things they need to do to make this information harder for an attacker to obtain.
On a practical scale, delegates will learn how to use Wireshark to analyse network traffic to look for problematic areas - to spot rogue devices communicating, to see if data can be eavesdropped, to see if spurious data is entering the network and much more.
Delegates will also learn how to use Nmap to scan for potential vulnerabilities on their systems and then learn how rectify any issues found.
With the use of Kali (The world's most popular penetration testing tool) delegates will experience some of the tools used in analysing networks and machines to expose vulnerable systems.
A mixture of Instructor-led presentations and hands-on exercises will allow delegates to fully understand the nature and complexity that is network stress testing.
At the conclusion of this course delegates will have an understanding of the processes and tools involved in stress testing a network to gauge how secure it is. Delegates will learn how to use Wireshark to examine the data flowing across their network and be able to identify troublesome systems. The use of tools such as Nmap will be examined that allow people to scan systems for possible weaknesses and tools within the Kali penetration testing program will be explored to show how other vulnerabilities can be detected and potentially exploited.
This course is aimed at existing system administrators who would like to be able to perform analysis of their own networks; as such a good working knowledge of Windows, Linux and networking principles is a must to understand many of the topics covered within this course. The course will utilise a number of virtual machine environments running both Linux and Windows operating systems, so a familiarity with working in virtual environments is also desired.
Module 1 - Introduction to Information Security
Module 2 - Legalities
Module 3 - Understanding Vulnerabilities, Exploits and Malware
Module 4 - Understanding how attacks happen
Module 5 - Tools that hackers use
Module 6 - Using Wireshark
Module 7 - Using Nmap
Module 8 - Using Kali
Module 9 - Using Metasploit
If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. It's a cost effective option.
Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.