info@sytechlabs.com
+91 8497953460/761
Toggle navigation
Home
About
Clients
Services
IT Security And Corporate Training
seminars & workshops
Cyber Crime Investigation & Cyber Laws Consultancy
Vulnerabilities Assessment & Penetration Testing
Secure Web Application & Software Development
Search Engine Optimization
Web Development/ App Development/ SEO
Into media
Training
Courses
Workshops and seminars
Request for workshop
Career
Contact us
A GUIDE TO NETWORK PENTEST
Introduction to Penetration
Testing
What is Penetration Testing
Basics of Penetration Testing
Types of Penetration Testing
Steps of Penetration Testing
Goals to Achieve the Penetration Testing
Methodologies of Penetration Testing
Working on Network Technologies (Using Packet Tracer)
Introduction to Networks (basics)
Difference between OSI and TCP model
IP addressing in depth
1.3.1 Demo of Three Way Handshaking
1.3.2 What is an IP?
1.3.3 Types of Address
1.3.4 Public IP address
1.3.5 Private IP address
1.3.6 Demos of Public and Private IP address
1.3.7 Calculation of subnets/Subnet Mask
1.4 Usage of Switches/ Routers/Hubs in practical scenarios
1.5 Building up of Network Topologies
1.6 Collisions and Broadcast Domains
3.Routers in Depth (Demos in Packet Tracer)
1.What are Routers??
2.Routing in details
3.Tools for networking
4.Static and Dynamic Routing
5.OSPF (open shortest path first)
6.RIP (Routing Information Protocol)
7.EIGRP (Enhanced Interior gateway Routing Protocol)
4.Switches in depth (Demos in packet tracer)
1. Working of a Switch
2. LAN Switching
3. CSMA/CD
4. VLANs (in depth)
1. Introduction to VLAN’s
2. Access Ports and Trunk Ports
3. Configuring VLAN’s in Packet Tracer
4. Native VLANs
5. Inter-VLAN Routing
5.Switch Security
6.Port Security
7.VTP(Virtual LAN Trunk Protocol)
1.Working of VTP
2.VTP modes
3.Configuring of VTP
8.STP (Spanning Tree Protocol)
1.Working of STP
2.Configuring of STP
9.NAT (Network Address Translations)
1.What is NAT?
2.Real-time Scenarios of using NAT
3.Types of NAT
4.Configuring of Static NAT
10.DHCP (Dynamic Host Configuration Protocol)
1.Introduction to DHCP
2. Configuring of DHCP
5.Ports
1. Introduction to Ports
2. Working of Ports
3. Types of Interfaces and ports
4. Scanning of Ports (using Nmap and Nessus)
5. Demo of Services running on ports
6.OS Hardening for Penetration Testing
1. Introduction to LINUX
2. Basic commands usage in LINUX
3. Programming Basics in LINUX
4. Cracking of roots in LINUX
5. Difference between LINUX and windows
7.ARP (Address Resolution Protocol)
1. Introduction to ARP
2. Working of ARP
3. Traffic Analysis (Using Wireshark)
4. Introduction to Sniffing
5. Demonstration
8.DOS AND DDOS
1. Introduction to Denial of Service
2. Introduction to Distributed Denial of Service
3. Difference between both of them
4. Practical Demonstration of DOS
5. Practical Demonstration of DDOS
6. IPSEC Policy
1. Introduction to IPSEC
2. Depth Study of IPSEC
3. Creation of Policy to protect against DOS attacks
9.Cryptography
1. Introduction to Cryptography
2. Symmetric Key Cryptography
3. Public Key Cryptography
4. Methodologies of Cryptography
1. Mono-alphabetic
2. Ceaser-Cipher
3. Advanced Ceaser Cipher
4. Poly-alphabetic
5. Vignere
6. Auto-key
7. Morse Code
8. Transposition Cipher
9. Rail-Fence Cipher
10.Route-Cipher
11.Cryptanalysis of Ciphers (Using Frequency Analysis)
5. Fiestal Ciphers
6. DES (Data Encryption Standards)
5.1 Introduction to DES
5.2 Working of DES
5.3 Round Structure of DES
5.4 Key Management Structure
5.5 Demonstration of DES
5.6 Double DES
5.7 Meet In the Middle Attack
7. AES (Advanced Encryption Standards)
7.1Introduction to AES
7.2 Working of AES
7.3 Round Structure of AES
7.4 Key Management Structure
7.5 Demonstration of AES
7.6 Vulnerabilities of DES and AES
7.7 Exploiting the vulnerabilities to AES and DES
7.8 Hash Functions
7.8.1 Introduction to Hash Functions
7.8.2 SHA (Secured Hash Algorithms)
7.8.3 MD5 (Message Detection Algorithms)
7.9 Attacks on Hash Functions
8 Intrusion Detection System
8.2 Introduction to Intrusion Detection System
8.3 Types of Intrusion detection System
8.4 Working of Intrusion Detection System
8.5 Practical Demonstration of Intrusion Detection System
8.6 Generating Alerts even on PING attacks
8.7 Track Down of Attacker
9 Advance Intrusion Detection System
9.2 Introduction to AIDE
9.3 Working of AIDE
9.4 PGP and GPG Encryptions
9.5 Demonstration of AIDE
9.6 Detection of Added Trojans or viruses by attackers
9.7 Audition of Any file
10 Wireless Penetration Testing
10.2 Introduction to Wireless
10.3 Types of Wireless Networks
10.4 Working of Wireless Networks
10.5 Working of Frequencies
10.6 Multiplexing
10.7 Divisions of Multiple Access
10.8 FDMA
10.9 CDMA
10.10 TDMA
10.11 In depth Study of WEP/WPA/WPA2
10.12 Handshaking of Open Authentication
10.13 3-way Handshaking of WEP
10.14 4-way Handshaking of WPA/WPA2
10.15 Vulnerabilities of WEP/WPA/WPA2
10.16 Exploitation of WEP/WPA/WPA2
Who should
attend
All students who use computers and Internet for their personal or academic work.
College students for Industrial training.
Students from any stream can attend this training.
Students who want to make their career in Information Security and Ethical Hacking.
Staff and Employees of colleges/school can join this training to live more secure from various attacks.
Pre-
requisites
Only Basics of Internet.
What you need to bring
Things required for Online Training
Laptop or Desktop (Os: Win7 / Win8 / Mac)
Internet Connection (Speed: min. 2mbps)
Headphones with mic
Things required for Online Training
Laptop or Desktop (Os: Win7 / Win8 / Mac)
Internet Connection (Speed: min. 2mbps)
Headphones with mic
Key
Take Away
The premier Certification in Ethical Hacking & Information Security
Hacking and Security Tools, Books, Tutorials to each student
Training by White Hat Hackers, Ethical Hackers, and Information Security Experts
Covers both sides of the coin - Attacks and Counter measures
Live training on pre attacks with their Counter measures, Hands on use many technical tools