New Courses

Cyber Security and Ethical Hacking

System Requirements For Cyber Security and Ethical Hacking Lab:

 


  • 8 GB (Gigabytes) of RAM or higher (16 GB recommended)/No Graphics card Required
  • 64-bit system processor is mandatory
  • 20 GB or more disk space
  • Enable virtualization technology on BIOS settings, such as “Intel-VTx”
  • Modern Browsers like Google Chrome (latest), Mozilla Firefox (latest), Microsoft Edge (latest) and Skype
  • All items referenced in this course are either free or is available on my blog linuxtiwary.com
  • A computer  or Laptop for installing all the free software and tools needed to practice
  • A strong desire to understand hacker tools and techniques
  • Be able to download and install all the free software and tools needed to practice
  • A strong work ethic, willingness to learn and plenty of excitement about the back door of the digital world
  • Headphone with Mic  and an Internet connection of at least 2mbps

Cyber Security and ethical Hacking Lab Setup :

 


Installation and Configuration of Virtualization Technology


Windows Installation inside VirtualBox


Linux (RedHat) Installation inside VirtualBox


Kali Linux Installation


Different Type of Network settings


Remote Support Through Virtualization


Virtualization extensions


Windows Operating System:


 


Basics of Windows


File and Folder Management in Windows


User Management in Windows


Disk Management


File and Folder Security


Disk Security


USB Security


Registry Editor


Group Policy Editor


Network Setup and Testing


Information gathering


Processor Hacking


Memory Management in Windows(virtual memory)


Malware Detection


System Performance


System Monitoring


Windows Password Hacking and Bypass


USB as RAM


Virtual hard Disk


Encrypting Virtual Hard Disk


Virtual Machines


Virtual Machine Weaknesses


Virtual Machine Hardening


Whonix OS – Anonymous Operating system


Whonix OS – Weaknesses


Qubes OS
Goals and Learning Objectives
The Importance of Patching
Windows 7 – Auto Update
Windows 8 & 8.1 – Auto Update

Windows 10 – Auto Update
Windows – Criticality and Patch Tuesday
Windows 7, 8, 8.1 & 10 – Automate the pain away from patching
Linux – Debian – Patching
Mac – Patching
Firefox – Browser and extension updates
Chrome – Browser and extension updates
IE and Edge – Browser and extension updates
Removing Privilege


Windows 7 – Not using admin
Windows 8 and 8.1 – Not using admin
Windows 10 – Not using admin


Auto updates – The Impact to privacy and anonymity


Security Domains, Isolation and Compartmentalization


CCNA Training Modules:


 


Introduction to computer Network


network Attacks


What is “Protocol”


Reference Models


OSI Reference Model


OSI vs TCP/IP


Demonstration using Wireshark


Standards & Protocols


Ethernet: Principles, Frame & Headers


ARP ( Address Resolution Protocol ) : Mechanism, ARP Tables, ARP Packets


ARP Hand-On Practices


VLANs – Virtual Local Area Networks


WLANs – Wireless Local Area Networks


Introduction to Network Layer


Internet Protocol – IP


IPv4 Adressing System


IPv4 Packet Header


IPv4 Subnetting: Classful Networks


IPv4 Subnetting: Subnet Mask


IPv4 Subnetting: Understanding
IPv4 Shortage
Private Networks
Private Networks – Demonstration


NAT – Network Address Translation


IPv6, Packet Header & Addressing


DHCP – How the Mechanism Works


ICMP – Internet Control Message Protocol


Traceroute


Introduction to Transport Layer


TCP – Transmission Control Protocol


TCP Header


UDP – User Datagram Protocol


Introduction to Application Layer


DNS – Domain Name System


HTTP ( Hyper Text Transfer Protocol )


HTTPS


TCP/IP Model and Internet


Introduction to Cisco Packet Tracer


Understand Network Topology


Understand wires and cables used in networking


Difference between Hubs- switches and Routers


IP Address brief


Types of Address


IPV4 addressing


binary conversion


Network Architecture


LAN MAN WAN SAN


understand DHCP server working


Understand DNS Server working


Understand FTP Server working


Understand SMTP and POP3 Server working


Understand NTP Server working


Understand HTTP and HTTPS Server working


Understand Syslog Server working


DHCP DNS FTP HTTP SMTP POP3 combined LAB


 Router Components


Components of routers


RAM NVRAM and FLASH Memory


Introduction to cisco IOS


IOS Modes on Cisco Devices


User EXEC mode


Privileged EXEC mode


Configuration mode


Interface Configuration mode


• Line Configuration mode


• Router Configuration mode


Enable Passwords


Line Passwords and Configuration


assign an IP address to an interface:


Assign secondary ip address on an Interface


Managing Configuration Files


running-config


startup-config


view the contents of the running-config and startup-config files


delete the contents of the startup-config file:


change the host name of your router


assign a description to an interface for documentation purposes


create a banner message which users will see when logging into an IOS device


Need of routing


Routing Configuration


Routing very basic Lab


Static Routing Configuration


Default Routing Configuration


Static with Default Routing with configuration


Router Loopback Interfaces


Dynamic Routing


Difference between Static and Dynamic routing


RIP Routing Configuration


RIPv1 and RIPv2


EIGRP Configuration Lab


EIGRP configuration with same AS value


EIGRP Configuration with different AS Value


OSPF Configuration basic Lab


OSPF configuration with single AREA


OSPF Configuration with Multi Area or Multi Area OSPF Lab


Router as a DHCP server


Router as a DHCP Client


Router as a Multiple DHCP Server


Switch Basics


Assign IP Address on Switch


Gateway IP on Switch


VLAN creation and Deletion on SWITCH


VTP


Multi user Lab using SWITCH


Telnet Configuration on switch


SSH configuration on switch


SWITCH SECURITY


enable password on switch


enable secret on switch


service password-encryption


PPP


Password Authentication Protocol configuration


CHAP configuration


ACL Configuration Lab


NAT configuration Lab


Removing IP Address from router Interfaces


Remove wrong Routing Configuration From router


Router Configuration Backup  and Restore using TFTP Server


Router Configuration Backup  and Restore using FTP Server


Linux Essential (Red-hat Enterprise Linux)


 


Red Hat Enterprise Linux basics and it’s variants


Design Classroom Network Using Virtualization Technology For Lab Practice.


Virtual-box installation and configuration.


VirtualBox Network Adapter settings.


Vmware Installation and Configuration.


Vmware Network Adapter settings.


Linux Files and Folder.


Copying files and folders in Linux.


Moving and Renaming Files and Folders in Linux.


Determining File Content.


Creating Fake files with desired size.


Standard input/output to a file.


Searching files and Folders in Linux.


Vim editor


Nano Editor


Writing shell script in Linux.


samples of shell scripting with examples.


Scripting:for Loops


Scripting:if statements


Spell check with Aspell command line tool.


Permission Types in Linux.


Changing files and Folder Permissions.


Special Permissions for files and folders in Linux.


Changing  User ownership and group ownership.


Symbolic and Numeric Method.


Soft Linking and hard Linking Files and Folders in Linux.


User and Group Management in Red Hat Enterprise Linux.


User management tools.


System users and groups.


Shell scripting for user management


shell scripting for user and group management


shell scripting for user and password management.


Different methods to Lock users in Linux.


Different Methods to Unlock Users in Linux.


Different methods to enable/Disable users in Linux.


Linux File System.


Partition creation and Deletion in Linux.


Linux File System Up-gradation and Degradation.


Swap Partition creation and Deletion.


Swap File Creation and Deletion.


Linux Server Configuration Labs


 


Xinetd Managed Services in Red Hat Enterprise Linux.


Telnet server


Secure Telnet server


Telnet Proxy


Proxychain For Telnet


Service and Application Access Controls in Linux.


Initialization Script Management.


Package Management in Linux using RPM and YUM.


Yum Local and Remote Server.


Network Configuration and Management in Linux.


Forward Lookups and Reverse Lookups


Exploring DNS with HOST.


Network File Service Configuration and Management.


NFS Server and NFS Clients and it’s utilities.


Samba service configuration and management.


TFTP Server Configuration


Uploading and Downloading Files through TFTP


File Transfer Protocol Configuration and Management.


Printer Configuration in Linux.


Apache Server configuration in Linux.


Apache Namespace configuration in Linux.


Virtual Hosting.


Proxy server Configuration for Your Web Server


Simple Mail Transfer Protocol Configuration and Management.


Squirrelmail and PHP.


Incoming sendmail configuration and outgoing sendmail configuration.


Postfix mail server configuration.


Dovecot configuration.


Web Based Mailing Service Live Project.


IMAP and POP3


OpenSSH Server configuration


scp:secure file transfer


Finger Server Configuration


Chat Server


Server Security labs :


 


SSH security


Telnet Security


IP Based Security


Network based Security


Time Based Security


Connection Based Security


Load Balancing


Apache Server Security


Checksum and verification


Clear Cache memory


md5sum and sha1sum


generate audit reports


Audit report about Linux Users


Report about Configuration changes


Report about logins


Report about account modifications


Successful Logins


Login summary Report


Records of bad Login attempts


FIREWALL and TCPWRAPPER Training :


 


Basics of IPTABLES


Configuration file for IPTABLES


File settings for IPTABLES


Firewall services


Allow or Deny Incoming Request


Allow or Deny Outgoing Request


block or allow certain IP Address


block or allow certain network Address


Block all ICMP incoming traffic


Block or allow all FTP/HTTP incoming traffic


Create user defined chain


Delete user defined chain


Allow or Block  particular PORT or service for particular IP Address or Network Address


Rename user defined chain


Log firewall rules


Backup or Restoring rules in iptables.


MAC address level filtering


TCP/UDP Port Filtering


Iptables configuration


Iptables services


ACL syntax for iptables


Iptables basic commands


Appending/Inserting rules


Replace rules for firewall


Firewall Backup and Restoring rules using Iptables


flush all chains PREROUTING FORWARD INPUT OUTPUT POSTROUTING


zero counters in Firewall


erase user created chains


allow icmp or ping protocol


open ssh port using Firewall


VNC client port using Frewall


Webserver:create rules to allow all traffic on port 80 and 443.


multiport allow or deny using Firewall


MAC address level filtering


Iptables log


allow Samba in iptables


configure NFS services to use fixed ports.


configure firewall to allow nfs traffic


TCPWRAPPER BASICS


BLOCK/ALLOW IP ADDRESS or Network Address through TCPWRAPPER


Block or Allow Particular service


Block or alow Particular Service for particular IP or Network.


Ethical hacking with Kali Linux and Penetration Testing


 


Install Kali Linux Graphically.


Setup Kali Linux Network Lab with Virtualization Technique.


Install Windows and RedHat Enterprise Linux as Client Machine.


Create and Configure a Bridge and Internal Network between all OS.


Files and Folder Creation ,Deletion and Renaming in Kali Linux.


Updating, Upgrading, Distro Understanding in kali Linux.


Kali Linux Administration.


Networking basics in Kali Linux.


Network Scanning in Kali Linux.


Network Monitoring in Kali Linux.


PostgreSQL Service


Creating a Workspace …………………………………………………………………
Database Nmap Scan …………………………………………………………………..
Hosts Database……………………………………………………………………………
Services Database ……………………………………………………………………….
Vulnerabilities Database …………………………………………………………….
Credentials Database …………………………………………………………………
Renaming Workspace ………………………………………………………………..
Deleting a Workspace ……………………………………………………………….
Verbose Details of Workspaces ………………………………………………….
Exporting Workspace ………………………………………………………………..
Deleting all Workspaces………………………………………………….
Importing Hosts………………………………………………………………
Listing Hosts in Database ……………………………………………………
Adding Hosts ………………………………………………………………
Deleting a host ……………………………………………………………….
Exporting Hosts Database …………………………………………………………..
Search and Tag Hosts ……………………………………………………………..
Filter Search……………………………………………………………………
Deleting Services of a Host…………………………………………………………
Filter Search…………………………………………………………………..
Port Specific Services……………………………………………………………
Exporting Services Database ………………………………………………………
Search Services………………………………………………………………….

Port Specific Vulnerabilities……………………………………………………
Service Specific Vulnerabilities ………………………………………………..
Host Specific Vulnerabilities………………………………………………….
Exporting Vulnerabilities Database………………………………………………
Loot Database ………………………………………………………………………….
Search Loot……………………………………………………………………….
Type Specific Loot……………………………………………………………………..
Deleting Loot……………………………………………………………………………

Metasploit configuration

Hack Telnet server using Metasploit.

Hack SSH Server using Metasploit.

HACK FTP Server using Metasploit.

Hack HTTP/WEB Server using Metasploit.

Metasploit and everything HTTP

Foot printing Concepts
• Footprinting Methodology
• Footprinting through Search Engines
• Footprinting through Web Services
• Footprinting through Social Networking Sites
• Website Footprinting
• Email Footprinting
• Whois Footprinting
• DNS Footprinting
• Network Footprinting
• Footprinting through Social Engineering
• Footprinting Tools
• Footprinting Countermeasures

Scanning Networks • Network Scanning Concepts
• Scanning Tools
• Host Discovery
• Port and Service Discovery
• OS Discovery (Banner Grabbing/OS
Fingerprinting)
• Scanning Beyond IDS and Firewall
• Draw Network Diagrams

Enumeration • Enumeration Concepts

• NTP and NFS Enumeration
• SMTP and DNS Enumeration
• Other Enumeration Techniques (IPsec,
Unix/Linux, Telnet, FTP, TFTP, SMB, IPv6,
enumeration)
• Enumeration Countermeasures

Web Server Concepts
• Web Server Attacks
• Web Server Attack Methodology
• Web Server Attack Tools
• Web Server Countermeasures
• Patch Management
• Web Server Security Tools

gathering website info
discovering technologies used on the website
gathering DNS information
Discovering subdomains
discovering sensitive files
Analyzing Discovered Files
Browser Security
Chrome security
Firefox Security


Hacking With Kali Linux


Setup Client Machines and Targets for Hacking.


Hacking FTP using Hydra.


Hacking SSH using Hydra.


Hacking WEB Services using Hydra.


Database Hacking and Password Attacks using Kali Linux


Learn to Download and use Dictionary attack.


Port Scanning using Nmap


IP and Network Scanning


DNS Footprinting


DNS Enumeration


Hacking facebook using Social Engineering


Hacking Gmail using Social Engineering


Zen map tool


DNSenum


DNSdict


Harvestor usage


DNSrecon


Generating Word list for hacking


information gathering using dmitry tool


information gathering using netdiscover


information gathering using sparta


Password Attacking through Hydra


Password Attacking through Medusa


Password Attacking through John


Password Attacking through Crunch


Password Attacking through Cewl


Scanning Web Application and web sites using wpscan


Scanning Web Application and web sites using cmseek


Website Information Gathering


Scan Website Vulnerability


Nikto (Website Information Gathering Tool)


Understand Hashing Algorithm


Crack Hash Algorithms


WordPress Security Scanner


Finding emails for Hacking


Learn Wireshark Tool


Learn Tshark Network Monitoring Tool


 System Security using Kali Linux.


Encrypt File and Folder using Kali Linux.


Openssl tool for cryptography


gpg- encryption


Vim Editor Security.


Hide your Real IP from Hackers.


Security Audit using Lynis (Automated Security Testing)


rootkit Scanning


Antivirus installation and usage in Kali Linux.


Encrypting Encrypting ZIP file.


Hiding text inside Images


Cyber Forensic using Windows


 

You may be also interested in

Register for FREE Demo

Fields marked with (*) are mandatory

* Name:
* Email:
* Phone:
* Location:
* Course:
* Enquiry:
* Captcha:

 

Client Feedback

Thanks, you guys provided the best online training in SAP BODS. The hands on training is very informative and helpful.

- David Sergi, Camaga Ltd; U.K