Post on 25-Jul-2015
transcript
Web Application Hacking. Network Infrastructure Hacking
www.ituniversity.ro
• Who are we? • For whom are those courses
intended? • What you will learn? • Network Infrastructure Hacking • Web Application Hacking • How to register? • Contact information - get in touch
with us2
Content
• We provide a vast portfolio of courses: Cisco CCNA, Cisco CCNA Security, NDG Linux Basics by Cisco, Security Trainings
• The trainings can be online, in person (at our headquarters in Ploiesti), or at the customer's location for more than 5 students
3
Who are we?
• We have gathered over 8 years of experience in the IT field, both in theoretical and practical
• Instructor's trainings and certifications: Certified Ethical Hacker, CCNA, CCNA Security, CCNP Routing, CCNP Switching, Advanced Linux&InfoSEC, VMWare vSphere Install, Configure, Manage, Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.
4
Who are we (cont.)?
!
!
• Network administrators • Web developers • System administrators • IT Security Managers • Students and IT passionates
5
For whom are those courses intended?
Think like a hacker and avoid being hacked! !
• You will learn hacking tools, methodologies and techniques
• Requirements: basic networking, basic linux • The course is a good start for a security career • The trainings has both theoretically and
practical approaches
6
What you will learn?
Curriculum and labs: !Chapter 1: Introduction to Ethical Hacking, Footprinting and Reconnaissance Chapter 2: Scanning Networks+Enumeration Chapter 3: System Hacking Chapter 4: Sniffing Chapter 5: Metasploit Chapter 6: Trojans, Backdoors, Viruses and Worms Chapter 7: Cryptography Chapter 8: Hacking Wireless Networks. Penetration Testing Chapter 9: Practical Exam
7
Network Infrastructure Hacking
• Learn how to use hacking tools, attacking methodologies and techniques
• The labs are both with step-by-step and challenge or"capture the flag" like, with network access to target virtual machines that have to be hacked into
8
Network Infrastructure Hacking
Course and labs print screens:
9
Network Infrastructure Hacking
• How to hack a network, if it's firewall protected and you can't just bypass it?
• Sometimes the only way into a network is trough it's web servers • Attack the web servers, get control over it and then attack the network
from the server. Ok, but how? This is all this course is all about • It sounds easy doesn't it? Even it isn't, come and find out how you can
do it!
10
Web Application Hacking
Curriculum: • Core problems (Causes. Defenses) • Web Technologies (HTTP Protocol, Web Functionality, Encoding) • Mapping (Spidering and Analyzing) • Attacking Authentication (Technologies, Flaws, Fixes, Brute Force) • Attacking Session Management (State, Tokens, Flaws) • Attacking Access Controls (Common Vulnerabilities, Attacks) • Attacking Data Stores (SQL Injection, Bypassing Filters, Escalation) • Bypassing Client-Side Controls (Browser Interception, HTML interception, Fixes) • Attacking the server (OS command Injection, Path Traversal, Mail Injection, File Upload) • Attacking Application Logic • Cross Site Scripting • Attacking Users (CSRF, ClickJacking, HTML Injection) !Labs: • Spidering, Website Analyzer • Brute-Force • Session Hijacking via Mann-in-The-Middle • SQL Injection • Upload File and Remote Execution • Cross-Site Scripting (Stored + Reflected, Creating your own Key Logger, Cookie Stealing, Preventing XSS) • CSRF (Change password trough CSRF vulnerability, Preventing CSRF)
11
Web Application Hacking
Curriculum and labs prints screens:
12
Web Application Hacking
!
• Register on www.ituniversity.ro ("Inscriere") • Go to "Clase disponibile" and select the desired
course
13
How to register?
!• Find out more on www.ituniversity.ro • For details about price and availability:
• E-mail us: contact@ituniversity.ro • Call us: 0040 724 485 985
14
Contact information - Get in touch with us