Cyber Infrastructure Attacks

Description

n this course, you will take your first steps in Cyber Security! The lessons will guide you through the initial stage of an attack, in which information is gathered, and then you will learn how to make your way into the organization. You will be introduced to network data analysis, and how to make sure you are not discovered when involved in offensive cyber activity. This course features hands-on simulations provided by @Cywar – a gamified training and assessment platform by HackerU Solutions.

Prerequisites:

  • Basic knowledge of the Linux OS
  • Basic knowledge of the Windows OS
  • Basic knowledge of networking

Module 1
Wireshark
-Wireshark usage
-Capture data on a network
-Analyzing data using Wireshark

Module 2
Footprinting And Reconnaissance
-Search engines
-People search
-Google Hacking DB
-Website footprinting
-Information gathering

Module 3
Network Scan
-Network layout & Services
-TCP & UDP handshake
-Port scan
-IDLE scan
-Firewall & IDS evasion
-Automation Scan

Module 4
Password Cracking
-Attack types
-Hash types
-Local cracking
-Remote Cracking

Wi-Fi Attack
Wifi Attack
-Wi-Fi encryption
-EAPOL protocol
-Automated Frameworks
-Data snif
-Rouge Access Point

Men In The Middle
-MITM Attack
-Arp Spoof
-DNS spoof
-Bypassing SSL
-MITM Automated Frameworks

Hacking Frameworks & Automation
-Terminology
-Search Engines
-Automated Frameworks
-Creating malicious files

Anonymity On The Network
-Proxy
-VPN
-Proxy chain
-TOR

Datasheets

  • Datasheet 1

Video



Categories


Partners: HackerU


Available Training: HackerU Offensive Cybersecurity