Web App and Network Infrastructure Hacking
description
Transcript of Web App and Network Infrastructure Hacking
-
Web Application Hacking. Network Infrastructure Hacking
www.ituniversity.ro
-
Who are we? For whom are those courses
intended? What you will learn? Network Infrastructure Hacking Web Application Hacking How to register? Contact information - get in touch
with us2
Content
-
We provide a vast portfolio of courses: Cisco CCNA, Cisco CCNA Security, NDG Linux Basics by Cisco, Security Trainings
The trainings can be online, in person (at our headquarters in Ploiesti), or at the customer's location for more than 5 students
3
Who are we?
-
We have gathered over 8 years of experience in the IT field, both in theoretical and practical
Instructor's trainings and certifications: Certified Ethical Hacker, CCNA, CCNA Security, CCNP Routing, CCNP Switching, Advanced Linux&InfoSEC, VMWare vSphere Install, Configure, Manage, Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.
4
Who are we (cont.)?
-
!!
Network administrators Web developers System administrators IT Security Managers Students and IT passionates
5
For whom are those courses intended?
-
Think like a hacker and avoid being hacked! !
You will learn hacking tools, methodologies and techniques
Requirements: basic networking, basic linux The course is a good start for a security career The trainings has both theoretically and
practical approaches
6
What you will learn?
-
Curriculum and labs: !Chapter 1: Introduction to Ethical Hacking, Footprinting and Reconnaissance Chapter 2: Scanning Networks+Enumeration Chapter 3: System Hacking Chapter 4: Sniffing Chapter 5: Metasploit Chapter 6: Trojans, Backdoors, Viruses and Worms Chapter 7: Cryptography Chapter 8: Hacking Wireless Networks. Penetration Testing Chapter 9: Practical Exam
7
Network Infrastructure Hacking
-
Learn how to use hacking tools, attacking methodologies and techniques
The labs are both with step-by-step and challenge or"capture the flag" like, with network access to target virtual machines that have to be hacked into
8
Network Infrastructure Hacking
-
Course and labs print screens:
9
Network Infrastructure Hacking
-
How to hack a network, if it's firewall protected and you can't just bypass it?
Sometimes the only way into a network is trough it's web servers Attack the web servers, get control over it and then attack the network
from the server. Ok, but how? This is all this course is all about It sounds easy doesn't it? Even it isn't, come and find out how you can
do it!
10
Web Application Hacking
-
Curriculum: Core problems (Causes. Defenses) Web Technologies (HTTP Protocol, Web Functionality, Encoding) Mapping (Spidering and Analyzing) Attacking Authentication (Technologies, Flaws, Fixes, Brute Force) Attacking Session Management (State, Tokens, Flaws) Attacking Access Controls (Common Vulnerabilities, Attacks) Attacking Data Stores (SQL Injection, Bypassing Filters, Escalation) Bypassing Client-Side Controls (Browser Interception, HTML interception, Fixes) Attacking the server (OS command Injection, Path Traversal, Mail Injection, File Upload) Attacking Application Logic Cross Site Scripting Attacking Users (CSRF, ClickJacking, HTML Injection) !Labs: Spidering, Website Analyzer Brute-Force Session Hijacking via Mann-in-The-Middle SQL Injection Upload File and Remote Execution Cross-Site Scripting (Stored + Reflected, Creating your own Key Logger, Cookie Stealing, Preventing XSS) CSRF (Change password trough CSRF vulnerability, Preventing CSRF)
11
Web Application Hacking
-
Curriculum and labs prints screens:
12
Web Application Hacking
-
! Register on www.ituniversity.ro ("Inscriere") Go to "Clase disponibile" and select the desired
course
13
How to register?
-
! Find out more on www.ituniversity.ro For details about price and availability:
E-mail us: [email protected] Call us: 0040 724 485 985
14
Contact information - Get in touch with us