SlideShare a Scribd company logo
1 of 8
Download to read offline
OTechs
for Hi-Techs
*‫المحدودة‬ ‫المتطورة‬ ‫للتقنيات‬ ‫أوتيكس‬ ‫شركة‬*
OTechs for Developed Technologies Co. ltd
Hacking and Penetration Testing
Training Course
WEB: www.otechs.org
EMAIL: info@otechs.org
PHONE: +249 - 183 403 559
WHATSAPP: +249 - 183 403 559
FACEBOOK: www.facebook.com/otechs.org
Course Duration: 5 Days ( 40 Hours )
Audience: System Administrators, Security Professionals, IT Professionals
Course Deliverability: On-site (world widely) , Online
Fees / trainee: EUR 1500
1. Introduction to Kali and Pen Testing
1. History of Kali
2. Kali Linux Installation
3. Basic Commands
4. Linux/Unix Architecture
2. Setup The LAB
1. Introduction to Virtualization
2. VirtualBox
3. VMWare
4. Dynamips
5. GNS3
6. Set up your own LAB
7. Access OTechs LAB
3. Penetration Testing Methodologies
1. Open Source Security Methodology Manual
2. Penetration Testing Execution Standard
3. Open Source WEB Application Security Project
4. Information Systems Security Assessment Framework
5. WEB Application Security Consortium Threat Classification
4. Pen Test Scope
1. Client Requirements
2. Pen Testing Plan
5. Reconnaissance
1. Passive Reconnaissance
2. DNS Information Gathering
3. Subdomains
4. whois
5. Gather Contact Information
6. Google Reconnaissance
7. Google Hacking Database
8. Network Enumeration
9. Dmitry
10. Goofile
11. Maltego
12. Discover Scripts
13. WEB Based Tools
6. Target Discovery
1. Layer 2 Discovery
2. Layer 3 Discovery
3. Network Discovery
4. Host Discovery
5. Scapy
7. Enumeration
1. OS Enumeration
2. Service Enumeration
3. NMAP Scanning
4. ZenMap Scanning
5. Zombie Scanning
6. WireShark
7. SMB Enumeration
8. SNMP Enumeration
9. VPN Enumeration
8. Vulnerability Scanning
1. Network Vulnerability Scanners
2. MetaSploit Auxiliary Scan
3. Nessus Scanning
4. OpenVAS Scanning
5. WEB Vulnerability Scanners
6. Cisco Vulnerability Scanners
7. Fuzzy Analysis
9. Exploitation
1. Introduction to Metasloit
2. Exploit Repositories
3. Meterpreter Basics
4. Meterpreter Advanced Exploitation
5. MSFConsole and MSFCLI
6. Armitage
7. Write You Exploitation
10.Maintaining Access
1. Post Exploitation
2. Persistence
11. Brute Forcing
1. Custom Password Lists
2. Hash Identifier
3. Rainbow Tables and opcrack
4. Hydra
5. John The Ripper
6. Xhydra and Johnny
7. SSH Bruttte Forcing
8. RDP Brute Forcing
9. WEB Forms Authentication Brute Forcing
12.Man in The Middle Attack
1. ARP Spoofing
2. Ettercap
3. DNS Spoofing
4. Xplico
5. Wireshark
13.WEB Application Penetration Testing
1. WAF Scan
2. Load Balancer Scan
3. WEB Site Scrawling
4. Burp Suite
5. Copy WEB Site
6. SSL Scanning
7. WordPress Scanning
8. Joomla Scanning
9. Session Tokens
10. SQL Injection
11. Denial of Service
14.Social Engineering
1. Social Engineering Toolkit
2. Spear Fishing Attack
3. Powershell Attack
4. Credential Harvester
15.Wireless Peneteration Testing
1. Wireless Reconnaissance
2. Bypassing Hidden ESSIDs
3. ByPassing MAC Filtering
4. WEP Attack
5. WPA/WPA2 Attack
6. Wireless Miss-Association Attack
7. Wireless MITM Attack
16.Cisco Penetration Testing
1. Cisco Exploit Scanner
2. VLAN Hopping Attack
3. CDP Flooding Attack
4. STP Attack
5. HSRP Attack
6. DTP Attack
7. 802.1q Attack
8. SSL VPN Exploit
17.Advanced Miscellaneous Attacks
1. Finding Exploits
2. AV Bypassing
3. Firewall Bypassing
4. IDS ByPassing
5. DHCP Starvation
6. Metasploit RC Scripts
7. Pivot Point Attack
8. DOS/DDOS Attack
9. Attacking the Domain Controller
18.IPv6 Penetration Testing
1. IPv6 Host Discovery
2. NDP DAD Attack
3. NDP RA Flooding
4. NDP NA Flooding
5. Rogue IPv6 RA
6. IPv6 Smurf
7. IPv6 MITM Attack

More Related Content

Similar to OTechs-Hacking_and_Penetration_Testing

N3XAsec CPTE plan de estudios detallado
N3XAsec CPTE plan de estudios detalladoN3XAsec CPTE plan de estudios detallado
N3XAsec CPTE plan de estudios detalladoRafael Seg
 
Java application security the hard way - a workshop for the serious developer
Java application security the hard way - a workshop for the serious developerJava application security the hard way - a workshop for the serious developer
Java application security the hard way - a workshop for the serious developerSteve Poole
 
SSMF (Security Scope Metasploit Framework) - Course Syllabus
SSMF (Security Scope Metasploit Framework) - Course SyllabusSSMF (Security Scope Metasploit Framework) - Course Syllabus
SSMF (Security Scope Metasploit Framework) - Course SyllabusSecurity Scope
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
 
Network programming blown up syllabus
Network programming blown up syllabusNetwork programming blown up syllabus
Network programming blown up syllabusVinay Kumar C
 
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxDetecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxRahul Mohandas
 
Automated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security IntelligenceAutomated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security IntelligenceJason Choi
 
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...PaloAltoNetworks
 
Network_Protocols_for_Security_Professionals_1650972481.pdf
Network_Protocols_for_Security_Professionals_1650972481.pdfNetwork_Protocols_for_Security_Professionals_1650972481.pdf
Network_Protocols_for_Security_Professionals_1650972481.pdfPoeLay6
 
Cross Context Scripting attacks & exploitation
Cross Context Scripting attacks & exploitationCross Context Scripting attacks & exploitation
Cross Context Scripting attacks & exploitationRoberto Suggi Liverani
 
Advanced-Penetration-TestinAPT With KALI Linux Course Content.pdf
Advanced-Penetration-TestinAPT With KALI Linux Course Content.pdfAdvanced-Penetration-TestinAPT With KALI Linux Course Content.pdf
Advanced-Penetration-TestinAPT With KALI Linux Course Content.pdfInfosec train
 
Advanced-Penetration-Testing_course_content
Advanced-Penetration-Testing_course_contentAdvanced-Penetration-Testing_course_content
Advanced-Penetration-Testing_course_contentpriyanshamadhwal2
 
OWASP Europe Summit Portugal 2008. Web Application Assessments
OWASP Europe Summit Portugal 2008. Web Application AssessmentsOWASP Europe Summit Portugal 2008. Web Application Assessments
OWASP Europe Summit Portugal 2008. Web Application AssessmentsInternet Security Auditors
 
ADVANCED PENETRATION TESTING.pdf
ADVANCED PENETRATION TESTING.pdfADVANCED PENETRATION TESTING.pdf
ADVANCED PENETRATION TESTING.pdfCert Hippo
 
Everybody loves html5,h4ck3rs too
Everybody loves html5,h4ck3rs tooEverybody loves html5,h4ck3rs too
Everybody loves html5,h4ck3rs tooNahidul Kibria
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry moreBHack Conference
 
Enterprise Java: Just What Is It and the Risks, Threats, and Exposures It Poses
Enterprise Java: Just What Is It and the Risks, Threats, and Exposures It PosesEnterprise Java: Just What Is It and the Risks, Threats, and Exposures It Poses
Enterprise Java: Just What Is It and the Risks, Threats, and Exposures It PosesAlex Senkevitch
 
Defending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecurityDefending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecuritySophos Benelux
 

Similar to OTechs-Hacking_and_Penetration_Testing (20)

Hhs toc glossary
Hhs toc glossaryHhs toc glossary
Hhs toc glossary
 
Stealth post-exploitation with phpsploit
Stealth post-exploitation with phpsploitStealth post-exploitation with phpsploit
Stealth post-exploitation with phpsploit
 
N3XAsec CPTE plan de estudios detallado
N3XAsec CPTE plan de estudios detalladoN3XAsec CPTE plan de estudios detallado
N3XAsec CPTE plan de estudios detallado
 
Java application security the hard way - a workshop for the serious developer
Java application security the hard way - a workshop for the serious developerJava application security the hard way - a workshop for the serious developer
Java application security the hard way - a workshop for the serious developer
 
SSMF (Security Scope Metasploit Framework) - Course Syllabus
SSMF (Security Scope Metasploit Framework) - Course SyllabusSSMF (Security Scope Metasploit Framework) - Course Syllabus
SSMF (Security Scope Metasploit Framework) - Course Syllabus
 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
 
Network programming blown up syllabus
Network programming blown up syllabusNetwork programming blown up syllabus
Network programming blown up syllabus
 
Detecting Evasive Malware in Sandbox
Detecting Evasive Malware in SandboxDetecting Evasive Malware in Sandbox
Detecting Evasive Malware in Sandbox
 
Automated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security IntelligenceAutomated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security Intelligence
 
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
Pro Tips for Power Users – Palo Alto Networks Live Community and Fuel User Gr...
 
Network_Protocols_for_Security_Professionals_1650972481.pdf
Network_Protocols_for_Security_Professionals_1650972481.pdfNetwork_Protocols_for_Security_Professionals_1650972481.pdf
Network_Protocols_for_Security_Professionals_1650972481.pdf
 
Cross Context Scripting attacks & exploitation
Cross Context Scripting attacks & exploitationCross Context Scripting attacks & exploitation
Cross Context Scripting attacks & exploitation
 
Advanced-Penetration-TestinAPT With KALI Linux Course Content.pdf
Advanced-Penetration-TestinAPT With KALI Linux Course Content.pdfAdvanced-Penetration-TestinAPT With KALI Linux Course Content.pdf
Advanced-Penetration-TestinAPT With KALI Linux Course Content.pdf
 
Advanced-Penetration-Testing_course_content
Advanced-Penetration-Testing_course_contentAdvanced-Penetration-Testing_course_content
Advanced-Penetration-Testing_course_content
 
OWASP Europe Summit Portugal 2008. Web Application Assessments
OWASP Europe Summit Portugal 2008. Web Application AssessmentsOWASP Europe Summit Portugal 2008. Web Application Assessments
OWASP Europe Summit Portugal 2008. Web Application Assessments
 
ADVANCED PENETRATION TESTING.pdf
ADVANCED PENETRATION TESTING.pdfADVANCED PENETRATION TESTING.pdf
ADVANCED PENETRATION TESTING.pdf
 
Everybody loves html5,h4ck3rs too
Everybody loves html5,h4ck3rs tooEverybody loves html5,h4ck3rs too
Everybody loves html5,h4ck3rs too
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry more
 
Enterprise Java: Just What Is It and the Risks, Threats, and Exposures It Poses
Enterprise Java: Just What Is It and the Risks, Threats, and Exposures It PosesEnterprise Java: Just What Is It and the Risks, Threats, and Exposures It Poses
Enterprise Java: Just What Is It and the Risks, Threats, and Exposures It Poses
 
Defending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen SecurityDefending the Endpoint with Next-Gen Security
Defending the Endpoint with Next-Gen Security
 

More from Osman Suliman

OTechs Network Monitoring (Nagios) Training Course
OTechs Network Monitoring (Nagios) Training CourseOTechs Network Monitoring (Nagios) Training Course
OTechs Network Monitoring (Nagios) Training CourseOsman Suliman
 
OTechs IT Package Training Course
OTechs IT Package Training CourseOTechs IT Package Training Course
OTechs IT Package Training CourseOsman Suliman
 
OTechs Training List
OTechs Training ListOTechs Training List
OTechs Training ListOsman Suliman
 
OTechs Virtual Private Servers (VPS) Plans
OTechs Virtual Private Servers (VPS) PlansOTechs Virtual Private Servers (VPS) Plans
OTechs Virtual Private Servers (VPS) PlansOsman Suliman
 
OTechs Mail system proposal
OTechs Mail system proposalOTechs Mail system proposal
OTechs Mail system proposalOsman Suliman
 
OTechs IT Out-Sourcing Services
OTechs IT Out-Sourcing ServicesOTechs IT Out-Sourcing Services
OTechs IT Out-Sourcing ServicesOsman Suliman
 
OTechs Product Catalogue
OTechs Product CatalogueOTechs Product Catalogue
OTechs Product CatalogueOsman Suliman
 
OTechs Cloud Computing Training Course
OTechs Cloud Computing Training CourseOTechs Cloud Computing Training Course
OTechs Cloud Computing Training CourseOsman Suliman
 
OTechs Cloud computing security
OTechs Cloud computing securityOTechs Cloud computing security
OTechs Cloud computing securityOsman Suliman
 
OTechs CompTIA A+ Training Course
OTechs CompTIA A+ Training CourseOTechs CompTIA A+ Training Course
OTechs CompTIA A+ Training CourseOsman Suliman
 
OTechs Information Security Training Course
OTechs Information Security Training CourseOTechs Information Security Training Course
OTechs Information Security Training CourseOsman Suliman
 
OTechs Advanced WEB Security Training Course
OTechs Advanced WEB Security Training CourseOTechs Advanced WEB Security Training Course
OTechs Advanced WEB Security Training CourseOsman Suliman
 
OTechs Advanced Mail Administration (POSTFIX) Training Course
OTechs Advanced Mail Administration (POSTFIX) Training CourseOTechs Advanced Mail Administration (POSTFIX) Training Course
OTechs Advanced Mail Administration (POSTFIX) Training CourseOsman Suliman
 
OTechs Advanced Virtualization Administration (VMWare vcp5) Training Course
OTechs Advanced Virtualization Administration (VMWare vcp5) Training CourseOTechs Advanced Virtualization Administration (VMWare vcp5) Training Course
OTechs Advanced Virtualization Administration (VMWare vcp5) Training CourseOsman Suliman
 
OTechs Logging System (syslog-ng) Training Course
OTechs Logging System (syslog-ng) Training CourseOTechs Logging System (syslog-ng) Training Course
OTechs Logging System (syslog-ng) Training CourseOsman Suliman
 
OTechs Hacking and Penetration Testing (BackTrack/Kali) Training Course
OTechs Hacking and Penetration Testing (BackTrack/Kali) Training CourseOTechs Hacking and Penetration Testing (BackTrack/Kali) Training Course
OTechs Hacking and Penetration Testing (BackTrack/Kali) Training CourseOsman Suliman
 
OTechs Directory Sevice (OpenLDAP) Training Course
OTechs Directory Sevice (OpenLDAP) Training CourseOTechs Directory Sevice (OpenLDAP) Training Course
OTechs Directory Sevice (OpenLDAP) Training CourseOsman Suliman
 

More from Osman Suliman (17)

OTechs Network Monitoring (Nagios) Training Course
OTechs Network Monitoring (Nagios) Training CourseOTechs Network Monitoring (Nagios) Training Course
OTechs Network Monitoring (Nagios) Training Course
 
OTechs IT Package Training Course
OTechs IT Package Training CourseOTechs IT Package Training Course
OTechs IT Package Training Course
 
OTechs Training List
OTechs Training ListOTechs Training List
OTechs Training List
 
OTechs Virtual Private Servers (VPS) Plans
OTechs Virtual Private Servers (VPS) PlansOTechs Virtual Private Servers (VPS) Plans
OTechs Virtual Private Servers (VPS) Plans
 
OTechs Mail system proposal
OTechs Mail system proposalOTechs Mail system proposal
OTechs Mail system proposal
 
OTechs IT Out-Sourcing Services
OTechs IT Out-Sourcing ServicesOTechs IT Out-Sourcing Services
OTechs IT Out-Sourcing Services
 
OTechs Product Catalogue
OTechs Product CatalogueOTechs Product Catalogue
OTechs Product Catalogue
 
OTechs Cloud Computing Training Course
OTechs Cloud Computing Training CourseOTechs Cloud Computing Training Course
OTechs Cloud Computing Training Course
 
OTechs Cloud computing security
OTechs Cloud computing securityOTechs Cloud computing security
OTechs Cloud computing security
 
OTechs CompTIA A+ Training Course
OTechs CompTIA A+ Training CourseOTechs CompTIA A+ Training Course
OTechs CompTIA A+ Training Course
 
OTechs Information Security Training Course
OTechs Information Security Training CourseOTechs Information Security Training Course
OTechs Information Security Training Course
 
OTechs Advanced WEB Security Training Course
OTechs Advanced WEB Security Training CourseOTechs Advanced WEB Security Training Course
OTechs Advanced WEB Security Training Course
 
OTechs Advanced Mail Administration (POSTFIX) Training Course
OTechs Advanced Mail Administration (POSTFIX) Training CourseOTechs Advanced Mail Administration (POSTFIX) Training Course
OTechs Advanced Mail Administration (POSTFIX) Training Course
 
OTechs Advanced Virtualization Administration (VMWare vcp5) Training Course
OTechs Advanced Virtualization Administration (VMWare vcp5) Training CourseOTechs Advanced Virtualization Administration (VMWare vcp5) Training Course
OTechs Advanced Virtualization Administration (VMWare vcp5) Training Course
 
OTechs Logging System (syslog-ng) Training Course
OTechs Logging System (syslog-ng) Training CourseOTechs Logging System (syslog-ng) Training Course
OTechs Logging System (syslog-ng) Training Course
 
OTechs Hacking and Penetration Testing (BackTrack/Kali) Training Course
OTechs Hacking and Penetration Testing (BackTrack/Kali) Training CourseOTechs Hacking and Penetration Testing (BackTrack/Kali) Training Course
OTechs Hacking and Penetration Testing (BackTrack/Kali) Training Course
 
OTechs Directory Sevice (OpenLDAP) Training Course
OTechs Directory Sevice (OpenLDAP) Training CourseOTechs Directory Sevice (OpenLDAP) Training Course
OTechs Directory Sevice (OpenLDAP) Training Course
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

OTechs-Hacking_and_Penetration_Testing

  • 1. OTechs for Hi-Techs *‫المحدودة‬ ‫المتطورة‬ ‫للتقنيات‬ ‫أوتيكس‬ ‫شركة‬* OTechs for Developed Technologies Co. ltd Hacking and Penetration Testing Training Course WEB: www.otechs.org EMAIL: info@otechs.org PHONE: +249 - 183 403 559 WHATSAPP: +249 - 183 403 559 FACEBOOK: www.facebook.com/otechs.org
  • 2. Course Duration: 5 Days ( 40 Hours ) Audience: System Administrators, Security Professionals, IT Professionals Course Deliverability: On-site (world widely) , Online Fees / trainee: EUR 1500 1. Introduction to Kali and Pen Testing 1. History of Kali 2. Kali Linux Installation 3. Basic Commands 4. Linux/Unix Architecture 2. Setup The LAB 1. Introduction to Virtualization 2. VirtualBox 3. VMWare 4. Dynamips 5. GNS3 6. Set up your own LAB 7. Access OTechs LAB
  • 3. 3. Penetration Testing Methodologies 1. Open Source Security Methodology Manual 2. Penetration Testing Execution Standard 3. Open Source WEB Application Security Project 4. Information Systems Security Assessment Framework 5. WEB Application Security Consortium Threat Classification 4. Pen Test Scope 1. Client Requirements 2. Pen Testing Plan 5. Reconnaissance 1. Passive Reconnaissance 2. DNS Information Gathering 3. Subdomains 4. whois 5. Gather Contact Information 6. Google Reconnaissance 7. Google Hacking Database 8. Network Enumeration 9. Dmitry 10. Goofile 11. Maltego 12. Discover Scripts 13. WEB Based Tools
  • 4. 6. Target Discovery 1. Layer 2 Discovery 2. Layer 3 Discovery 3. Network Discovery 4. Host Discovery 5. Scapy 7. Enumeration 1. OS Enumeration 2. Service Enumeration 3. NMAP Scanning 4. ZenMap Scanning 5. Zombie Scanning 6. WireShark 7. SMB Enumeration 8. SNMP Enumeration 9. VPN Enumeration 8. Vulnerability Scanning 1. Network Vulnerability Scanners 2. MetaSploit Auxiliary Scan 3. Nessus Scanning 4. OpenVAS Scanning 5. WEB Vulnerability Scanners 6. Cisco Vulnerability Scanners 7. Fuzzy Analysis
  • 5. 9. Exploitation 1. Introduction to Metasloit 2. Exploit Repositories 3. Meterpreter Basics 4. Meterpreter Advanced Exploitation 5. MSFConsole and MSFCLI 6. Armitage 7. Write You Exploitation 10.Maintaining Access 1. Post Exploitation 2. Persistence 11. Brute Forcing 1. Custom Password Lists 2. Hash Identifier 3. Rainbow Tables and opcrack 4. Hydra 5. John The Ripper 6. Xhydra and Johnny 7. SSH Bruttte Forcing 8. RDP Brute Forcing 9. WEB Forms Authentication Brute Forcing
  • 6. 12.Man in The Middle Attack 1. ARP Spoofing 2. Ettercap 3. DNS Spoofing 4. Xplico 5. Wireshark 13.WEB Application Penetration Testing 1. WAF Scan 2. Load Balancer Scan 3. WEB Site Scrawling 4. Burp Suite 5. Copy WEB Site 6. SSL Scanning 7. WordPress Scanning 8. Joomla Scanning 9. Session Tokens 10. SQL Injection 11. Denial of Service
  • 7. 14.Social Engineering 1. Social Engineering Toolkit 2. Spear Fishing Attack 3. Powershell Attack 4. Credential Harvester 15.Wireless Peneteration Testing 1. Wireless Reconnaissance 2. Bypassing Hidden ESSIDs 3. ByPassing MAC Filtering 4. WEP Attack 5. WPA/WPA2 Attack 6. Wireless Miss-Association Attack 7. Wireless MITM Attack 16.Cisco Penetration Testing 1. Cisco Exploit Scanner 2. VLAN Hopping Attack 3. CDP Flooding Attack 4. STP Attack 5. HSRP Attack 6. DTP Attack 7. 802.1q Attack 8. SSL VPN Exploit
  • 8. 17.Advanced Miscellaneous Attacks 1. Finding Exploits 2. AV Bypassing 3. Firewall Bypassing 4. IDS ByPassing 5. DHCP Starvation 6. Metasploit RC Scripts 7. Pivot Point Attack 8. DOS/DDOS Attack 9. Attacking the Domain Controller 18.IPv6 Penetration Testing 1. IPv6 Host Discovery 2. NDP DAD Attack 3. NDP RA Flooding 4. NDP NA Flooding 5. Rogue IPv6 RA 6. IPv6 Smurf 7. IPv6 MITM Attack