Course Overview

Networks can be prone to several vulnerabilities and attacks despite possessing security features. Thus, network penetration testing is a highly sought-after skill for penetration testers, ethical hackers and network security engineers.

This course focuses on helping aspiring security professionals such as ethical hackers and penetration testers to acquire the knowledge and hands-on skills needed to perform network-based vulnerability assessment on an organization’s network infrastructure and to use penetration testing techniques and tools to discover hidden security flaws on systems.  

By the end of this course, you will master popular tools while using the same techniques as seasoned cybersecurity professionals within the industry.

What You Will Learn

  • You will learn the fundamentals of network penetration testing.
  • You will learn how to perform scanning and enumeration on systems.
  • You will learn how to discover and exploit security vulnerabilities.
  • You will learn how to compromise wireless networks.
  • You will learn how to implement persistence on compromised systems on a network.

Program Curriculum

  • Introduction
  • Introduction to Network Penetration Testing
  • Types of Network Penetration Testing
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chater 1 Quiz

  • Introduction
  • Setting Up a Hypervisor and Virtual Networks
  • Setting Up Kali Linux
  • Setting Up Vulnerable Host Machines
  • Setting Up Vulnerable Web Applications
  • Setting Up a Vulnerable Wireless Network

  • Introduction
  • Introduction to Network Scanning
  • Banner Grabbing and Enumeration
  • Hands-on Network Scanning with Nmap
  • Network Vulnerability Scanning with Nmap
  • Network Vulnerability Scanning with Nessus

  • Introduction
  • Evading Antivirus (Metasploit)
  • Exploiting Vulnerable Systems
  • Performing Password-Based Attacks
  • Cracking SSH Access

  • Introduction
  • Setting Up for Butter Overflow
  • Spiking and Fuzzing Techniques
  • Determining the Offset
  • Finding Bad Characters
  • Find the Right Component
  • Creating Malicious Shellcode for Root Access

  • Introduction
  • Understanding Credentials Harvesting 2
  • Password Hash Extraction from Windows-Based Systems
  • Password Hash Extraction from Linux-Based Systems
  • Privilege Escalation Attack

  • Introduction
  • Implementing Persistence with Meterpreter
  • Implementing Persistence with Netcat
  • Performing Pivoting Using Metasploit
  • Controlling The Network

  • Introduction
  • Setting up FoxyProxy with BurpSuite
  • Performing SQL Injection Attack
  • Performing Broken Authentication Attack
  • Discovering Authentication Failures
  • Exploiting Cryptographic Failures
  • Automating SQL Injection

  • Introduction
  • Wireless Networking for Security Professionals
  • Wireless Reconnaissance
  • Attacking WEP Networks
  • Attacking WPA/WPA Networks

  • Introduction
  • Types of Social Engineering
  • Performing Social Engineering Attacks

  • Introduction
  • Sniffing and Man in The Middle
  • Packet Analysis with Wireshark

  • Introduction
  • Bypassing Network Firewalls
  • HTTP Tunneling
  • Port Traffic Attacks

  • Introduction
  • Reporting and Documentation
  • Penetration Testing Best Practices
  • A Pathway to Certified Penetration Testing Professional (CPENT)
  • Course Conclusion and Final Remarks
Load more modules

Instructor

Glen Singh

Author

Glen D. Singh, CEH, CHFI, CCNA (CyberOps, Security, and Routing & Switching) is a cybersecurity instructor, author, and consultant. He specializes in penetration testing, digital forensics, network security, and enterprise networking. He enjoys teaching and mentoring students, writing books, and participating in a range of outdoor activities. As an aspiring game-changer, Glen is passionate about developing cyber security awareness in his homeland, Trinidad and Tobago. Glen is also the author of the following books: Learn Kali Linux 2019 Hands-On Penetration Testing with Kali NetHunter CompTIA Network+ Certification Guide CCNA Security 210-260 Certification Guide

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8