Description
Neonetwireless Whitehat Hacking and Penetration testing training covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and understanding how you are vulnerable is the best way to learn how you can prevent attacks.
The training includes researching and background information retrieval, networking fundamentals, a deeper look at TCP/IP and packets, as well as understanding cryptography. students will learn about scanning networks, penetration testing and the use of Metasploit, malware and viruses, DoS and DDoS attacks, web application hacking and securing wireless networks.They will also learn about detection evasion and preventing programming attacks, and much more............After the Whitehat Hacking and Penetration testing training, students will have a deeper understanding of the areas that may be potentially vulnerable to attack in, as well as the methods that hackers use to exploit your systems, allowing you to better understand how to secure your hardware and data from unethical hackers.
The training includes researching and background information retrieval, networking fundamentals, a deeper look at TCP/IP and packets, as well as understanding cryptography. students will learn about scanning networks, penetration testing and the use of Metasploit, malware and viruses, DoS and DDoS attacks, web application hacking and securing wireless networks.They will also learn about detection evasion and preventing programming attacks, and much more............After the Whitehat Hacking and Penetration testing training, students will have a deeper understanding of the areas that may be potentially vulnerable to attack in, as well as the methods that hackers use to exploit your systems, allowing you to better understand how to secure your hardware and data from unethical hackers.
FEE:N120,000
DURATION 3 WEEKS
MODULES:
1.Web Penetration Testing - Nikto Web Vulnerability Scanner
2.Web App Penetration Testing - DirBuster
3.Web App Penetration Testing - CSRF (Cross Site Request Forgery)
4.Web App Penetration Testing - Setting Up Burp Suite
5.Web App Penetration Testing - Target Scope And Spidering
6.Web App Penetration Testing - Discovering Hidden Files With ZAP
7.Web App Penetration Testing - WordPress Vulnerability Scanning & Username Enumeration
8.Web App Penetration Testing - SQL Injection With sqlmap
9.Web App Penetration Testing - Load Balancer Scan
10.Web App Penetration Testing - XSS(Reflected, Stored & DOM)
11.Web App Penetration Testing - Cookie Collection & Reverse Engineering
12.Web App Penetration Testing - HTTP Attributes (Cookie Stealing)
13.Web App Penetration Testing - Configuring The Proxy
14.Web Server Penetration Testing - FTP Backdoor Command Execution With Metasploit
15.Web Server Penetration Testing - Samba Command Executions - Metasploit Payloads
16.Vulnerability Analysis With OpenVAS
17.DotDotPwn - Directory Traversal Fuzzing
ADDRESS: Neonetwireless Nig Ltd 39A, Ayilara Street, Off Lawanson/Itire Rd. Opp. Ojuelegba Bus-Stop, Surulere, Lagos.
ACCOMMODATION: FREE
WHATSAPP: 08037676772 and 08188267100 VOICE CALLS: 08181355444,08114555079 or 08023365905 for more info on how to register.
ACCOMMODATION: FREE
WHATSAPP: 08037676772 and 08188267100 VOICE CALLS: 08181355444,08114555079 or 08023365905 for more info on how to register.
1 Comments
SVG are an intriguing web design resource with several advantages. Whilst SVG provides a whole lot of power in the vector-graphics space, in addition, it has lots of creative uses outside of it.Author is an expert of scalable vector graphics, click here for more interesting information.
ReplyDelete