This course is designed to show delegates some of the most popular tools available for stress
testing their own network infrastructure. It also demonstrates how attackers could penetrate a
system with the use of the very same tools.
Delegates will learn about the multitude of ways an attacker can gather preliminary information
about a target network and by doing so will make delegates aware of the things they need to do to
make this information harder for an attacker to obtain.
On a practical scale, delegates will learn how to use Wireshark to analyse network traffic to
look for problematic areas - to spot rogue devices communicating, to see if data can be
eavesdropped, to see if spurious data is entering the network and much more.
Delegates will also learn how to use Nmap to scan for potential vulnerabilities on their systems
and then learn how rectify any issues found.
With the use of Kali (The world's most popular penetration testing tool) delegates will
experience some of the tools used in analysing networks and machines to expose vulnerable
A mixture of Instructor-led presentations and hands-on exercises will allow delegates to fully
understand the nature and complexity that is network stress testing.
At the conclusion of this course delegates will have an understanding of the processes and tools
involved in stress testing a network to gauge how secure it is. Delegates will learn how to use
Wireshark to examine the data flowing across their network and be able to identify troublesome
systems. The use of tools such as Nmap will be examined that allow people to scan systems for
possible weaknesses and tools within the Kali penetration testing program will be explored to show
how other vulnerabilities can be detected and potentially exploited.
This course is aimed at existing system administrators who would like to be able to perform
analysis of their own networks; as such a good working knowledge of Windows, Linux and networking
principles is a must to understand many of the topics covered within this course. The course will
utilise a number of virtual machine environments running both Linux and Windows operating systems,
so a familiarity with working in virtual environments is also desired.
Module 1 - Introduction to Information Security
This module looks at the basics of Information Security, IT security and Information Assurance and
identifies the basic steps companies should be covering when looking at keeping their networks and
Module 2 - Legalities
This module highlights the legal issues that should be addressed before anyone attempts to do any
form of network security stress testing. The tools used can potentially expose sensitive data, or
even damage systems and so all legal issues should be identified and approved first.
Module 3 - Understanding Vulnerabilities, Exploits and Malware
This module will uncover how vulnerabilities are identified and categorised, but also where the
source code for many vulnerabilities can be found to help you test them against systems on your
network. By using tools such as "the exploit-db.com" or "Metasploit", administrators can run
exploits against their own systems to see if security measures in place defend against such
Module 4 - Understanding how attacks happen
In this module, delegates will discover the many ways in which an attacker will scope-out a
potential target, from OSINT, through Social Engineering, Phishing, dumpster diving and much more;
an attacker will build a complex map of useful information to use in the actual attack. By knowing
what sort of data an attacker looks for, companies can be more selective of the data they divulge
or dispose of.
Module 5 - Tools that hackers use
This module introduces the stress testing tools used within the course. Whilst these tools are
designed for system administrators for exactly this purpose, they are also the very same tools
attackers and hackers use to attempt to break-down the security implementations in place. Tools
such as Wireshark, Nmap and Kali will be introduced here.
Module 6 - Using Wireshark
This module concentrates on how to use Wireshark to analyse data that passes through a network. It
looks at the capabilities as well as the limitations of the product and how to use it to build a
picture of normal data conditions which can be compared against suspect data patterns to see if a
compromise has occurred.
Module 7 - Using Nmap
This module will explore the features available within Nmap and its ability to identify potential
weaknesses within a network.
Module 8 - Using Kali
This module looks at the system that is Kali and some of the hundreds of tools available within.
From vulnerability assessments, through to exploitation capabilities, Kali has it all. This course
will highlight some of the more useful aspects of Kali when stress testing a network and its
Module 9 - Using Metasploit
In this module, delegates will experience how the Metasploit framework links in with the
exploit-db.com website to create possibly the world's best stress testing utility. Delegates will
experience first-hand how to compromise a vulnerable machine and then how to stop such attacks from
If you need training for 3 or more people, you should ask us about onsite training. Putting
aside the obvious location benefit, content can be customised to better meet your
business objectives and more can be covered than in a public classroom. It's a cost effective option.
Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or
simply mention it when we contact you.