The Art of Hacking (Bootcamp)

2,000.00 +Iva

Dias: 5
Duração: 35 horas
Próxima Data: 12/09/2022 a 16/09/2022
Área: Cibersegurança
Certificação Associada: N/A
Local: N/A

*Curso disponível em Live Training

Quero inscrever-me
REF: NSSAoH Categorias: , Etiqueta:


Master the Art of Hacking by building your hands-on skills in a sophisticated hack-lab with material that is delivered on the world conference stage; certified, accredited, continually updated and available globally.


System Administrators, Web Developers, SOC analysts, Penetration Testers, network engineers, security enthusiasts and anyone who wants to take their skills to the next level.


Module 1: The Art Of Port Scanning

• Basic concepts of Hacking Methodology
• Enumeration techniques and Port scanning

Module 2: The Art Of Online Password Attacks

• Configure online password attack
• Exploiting network service misconfiguration

Module 3: The Art Of Hacking Databases

• Mysql, Postgres
• Attack chaining techniques

Module 4: Metasploit Basics

• Exploitation concepts, Manual exploitation methodology
• Metasploit framework

Module 5: Password Cracking

• Understanding basic concepts of cryptography,
• Design offline brute force attack

Module 6: Hacking Unix

• Linux vulnerabilities, misconfiguration
• Privilege escalation techniques

Module 7: Hacking Application Servers On Unix

• Web server misconfiguration
• Multiple exploitation techniques

Module 8: Hacking Third Party Cms Software

• CMS Software
• Vulnerability scanning & exploitation

Module 9: Windows Enumeration

• Windows Enumeration techniques & Configuration Issues
• Attack chaining

Module 10: Client-Side Attacks

• Various Windows client-side attack techniques

Module 11: Privilege Escalation On Windows

• Post exploitation
• Windows Privilege escalation techniques

Module 12: Hacking Application Servers On Windows

• Web server misconfiguration
• Exploiting Application servers

Module 13: Post Exploitation

• Metasploit Post exploitation techniques
• Window 10 Security features & different bypass techniques

Module 14: Hacking Windows Domains

• Understanding Windows Authentication
• Gaining access to Domain Controller

Module 15: Understanding The Http Protocol

• HTTP Protocol Basics
• Introduction to proxy tools

Module 16: Information Gathering

• Enumeration Techniques
• Understanding Web Attack surface

Module 17: Username Enumeration & Faulty Password Reset

• Attacking Authentication and Faulty Password mechanisms

Module 18: Issues With Ssl/Tls

• SSL/TLS misconfiguration

Module 19: Authorization Bypass

• Logical Bypass techniques
• Session related issues

Module 20: Cross Site Scripting (Xss)

• Various types of XSS
• Session Hijacking & other attacks

Module 21: Cross Site Request Forgery (Csrf)

• Understanding CSRF attack

Module 22: Sql Injection

• SQL Injection types
• Manual Exploitation

Module 23: Xml External Entity (Xxe) Attacks

• XXE Basics
• XXE exploitation

Module 24: Insecure File Uploads

• Attacking File upload functionality

Module 25: Deserialization Vulnerabilities

• Serialization Basics
• PHP Deserialization Attack


Students should bring their own laptop, and must have administrative access to perform tasks like install software, disable antivirus etc. Devices that don’t have an Ethernet connection (e.g. MacBook Air, tablets etc.) are not supported.

Outras datas