You are here: Home Courses and Certifications Information Security Courses Penetration Testing Tools & Techniques

Harmony Solutions

Slideshow Image 1
Slideshow Image 2
Penetration Testing Tools & Techniques

Overview

This 5-day instructor-led course provides an in-depth introduction to various tools and techniques that are used to perform penetration tests - it is not aligned to a specific examination or vendor accreditation and therefore the content can be updated by Harmony on a regular basis.
This course is designed for IT professionals who will perform penetration tests or those who need to understand the tools & techniques used in penetration testing
The course contains extensive hands-on exercises using the tools included in the popular BackTrack distribution and other open source tools.

Prerequisites

  • The course requires an understanding of Information Security fundamentals such as basic attack strategies, exploitation of vulnerabilities and an awareness of basic operating system and network functions.
  • Many of the exercises involve using the command line and delegates should be comfortable with this environment. Familiarity with any common Linux distribution, particularly Ubuntu, would be an advantage.

Delegates will learn how to:

  • Understand the purpose of a penetration test
  • Install the BackTrack distribution
  • Use the tools installed on BackTrack and others to conduct a successful penetration test
  • Document the results of the penetration test

 

 
Content

Introduction to Penetration Testing

  • The purpose of a penetration test.
  • The Open Source Security Testing Methodology Manual, NIST SP800-115 & other methodologies

The BackTrack Distribution

  • Installation options
  • Using BackTrack

Documentation

  • Using Dradis

Reconnaissance & Network Mapping

  • Online reconnaissance
  • Social networking
  • Social engineering
  • Ping sweeps using fping
  • Port scanning using Nmap.
  • Scanning a target using Nessus
  • Scanning a web server using Nikto

Exploitation

  • Password cracking tools
  • Using John the Ripper

Metasploit

  • The Metasploit Framework
  • Using Metasploit to access systems

Analysis & Reporting

  • Writing the final penetration test report

 

 
Course Dates

Contact us for details on this Course

 

 

Other Upcoming Courses

PRINCE2 Practitioner
21 Jun 2018 to 22 Jun 2018
ITIL® Intermediate Lifecycle Continual Service Improvement
11 Jun 2018 to 13 Jun 2018
PRINCE2 Foundation.
18 Jun 2018 to 20 Jun 2018
ISO 27001 ISMS Foundation Lead Implemntor & Auditor
02 Jul 2018 to 06 Jul 2018
ITIL IT Service Management Foundation Certificate
25 Jun 2018 to 27 Jun 2018