Duration
50 Hours
Investment
LKR 200 000 / US$ 615
Delivery method
Online
Instructor
Mr M Athavan ( 10+ years of industrial experience )
Module 1: HACKING LAB
- Introduction to Hacking Lab:
- Purpose and significance of a hacking lab
- Overview of tools and environments
- Setting up a Hacking Environment:
- Virtualization tools and configurations
- Creating a secure testing environment
- Common Hacking Techniques:
- Overview of prevalent hacking methods
- Ethical hacking principles and responsible use
Module 2: Introduction to Linux
- Understanding Linux:
- Basics of the Linux operating system
- File system structure and navigation
- Linux Permissions:
- User roles, permissions, and security implications
- Changing file permissions
- Package Management:
- Installing and updating software in Linux
- Dependency management and securing the package manager
- Security Best Practices in Linux:
- User account management
- Configuring and monitoring firewalls
Module 3: Reconnaissance
- Overview of Reconnaissance:
- Significance in cybersecurity
- Types: passive and active reconnaissance
- Passive Reconnaissance:
- Gathering information without direct interaction
- Utilizing open-source intelligence (OSINT) tools
- Active Reconnaissance:
- Techniques like DNS enumeration and network scanning
- Avoiding detection during active reconnaissance
Module 4: Scanning
- Scanning Techniques:
- Overview of port scanning methods
- Network mapping with tools like Nmap
- Vulnerability Scanning:
- Identifying weaknesses in a system
- Use of automated tools for vulnerability assessment
Module 5: Vulnerability Analysis
- Understanding Vulnerabilities:
- Common software vulnerabilities
- Impact on cybersecurity
- Manual Vulnerability Assessment:
- Hands-on identification and analysis of vulnerabilities
- Reporting and remediation strategies
Module 6: Exploitation & Gaining Access
- Exploitation Techniques:
- Introduction to common exploitation methods
- Utilizing exploit frameworks (e.g., Metasploit)
- Gaining Access:
- Post-exploitation phases
- Escalating privileges and maintaining persistence
Module 7: Post Exploitation
- Post-Exploitation Activities:
- Post Exploiting theory
- Meterpreter Basic
- Elevating Privileges with Different Modules
- Creating Persistence on the Target if possible
- Post Exploiting Module
Module 8: Vulnerability Patching
- Intro to Vulnerability Patching:
- The importance of timely patching
- Patch management lifecycle
- Patch Management Strategies:
- Planning and scheduling patch deployments
- Challenges and best practices
- Security Impact of Patching:
- Balancing security needs with system stability
- Assessing and mitigating risks associated with patching