0845 450 6120

Penetration Testing – Tools & Techniques

This instructor-led course provides an in-depth introduction to various tools and techniques that are used to perform penetration tests - it is not aligned to a specific examination or vendor accreditation and therefore the content can be updated by the trainer on a regular basis.

The course contains extensive hands-on exercises using the tools included in the popular BackTrack distribution and other open source tools.

Target Audience:

This course is designed for IT professionals who will perform penetration tests or those who need to understand the tools & techniques used in penetration testing.

Reset

Learning Objectives

At the end of this course you will be able to:

  • Understand the purpose of a penetration test
  • Understand the 'rules of engagement'
  • Install the BackTrack distribution
  • Use the tools installed on BackTrack and others to conduct a successful penetration test
  • Document the results of the penetration test

Pre-Requisites

  • The course requires an understanding of Information Security fundamentals such as basic attack strategies, exploitation of vulnerabilities and an awareness of basic operating system and network functions.
  • Many of the exercises involve using the command line and delegates should be comfortable with this environment. Familiarity with any common Linux distribution, particularly Ubuntu, would be an advantage.

Course Content

Introduction to Penetration Testing

  • The purpose of a penetration test.
  • The Open Source Security Testing Methodology Manual, NIST SP800-115 & other methodologies

The BackTrack Distribution

  • Installation options
  • Using BackTrack

Documentation

  • Using Dradis

Reconnaissance & Network Mapping

  • Online reconnaissance
  • Social networking
  • Social engineering
  • Ping sweeps using fping
  • Port scanning using Nmap.
  • Scanning a target using Nessus
  • Scanning a web server using Nikto

Exploitation

  • Password cracking tools
  • Using John the Ripper

Metasploit

  • The Metasploit Framework
  • Using Metasploit to access systems

Analysis & Reporting

  • Writing the final penetration test report

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the request service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.

 

Online Courses

You may prefer an online course if you are looking for a flexible and cost-effective solution. Online courses allow you to study at your own pace, at a time that suits you.

We have the following eLearning options available:

Virtual Classroom

Virtual classrooms provide all the benefits of attending a classroom course without the need to arrange travel and accomodation. Please note that virtual courses are attended in real-time, commencing on a specified date.

Virtual Course Dates

Our Customers Include