Ethical Hacking of Corporate Networks_

We’ll teach you to see the network through an attacker’s eyes—from mapping to mitigation

What you’ll get to try out in practice during the course:

  • You will learn how to intercept communications and techniques for capturing passwords.
  • You will conduct a practical reconnaissance of the target system and gather as much information as possible (footprinting/reconnaissance).
  • You’ll learn how to identify open ports and detected vulnerabilities.
  • You will try out various ways to exploit the vulnerabilities you have discovered on the network.
  • You will practice basic security measures and proper network configuration.
  • You will use the Metasploit tool to perform active testing on target systems.

Basic outline:

  • Introduction to Ethical Hacking.
  • Footprinting and reconnaissance — how to systematically gather information.
  • Network scanning and identification of open ports.
  • Scanning and analyzing vulnerabilities on devices on the network.
  • System hacking and sniffing methods.
  • Attacks targeting computers on the same network.
  • Hands-on work with Metasploit — exploiting and verifying vulnerabilities.

Who is this course intended for?

The course is open to anyone who wants to learn ethical hacking and improve the security of their networks. It is particularly suitable for:

  • Ethical hackers and penetration testers
  • Security Managers
  • Network Administrators
  • Computer science students

Requirements

Basic understanding of IT issues.
No prior experience with Linux or programming is required.


Course outline:

The course lasts 2 days
Always from 9:00 a.m. to 4:00 p.m., with a one-hour lunch break.

The following will be available during the training:
Wi-Fi connection
Coffee, tea, water, lunch, and light snacks
Notebook and pen
Upon completion of the course, you will receive a certificate of completion.