100% found this document useful (1 vote)
196 views14 pages

Web App and Network Infrastructure Hacking

Cisco CCNA, Cisco CCNA Security, NDG Linux Basics by Cisco, Security Trainings • The trainings can be online, in person (at our headquarters in Ploiesti), or at the customer's location for more than 5 students • We have gathered over 8 years of experience in the IT field, both in theoretical and practical • Instructor's trainings and certifications: Certified Ethical Hacker, CCNA, CCNA Security, CCNP Routing, CCNP Switching, Advanced Linux&InfoSEC, VMWare vSphere Install, Configure, Manage, Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.

Uploaded by

gabyavra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
196 views14 pages

Web App and Network Infrastructure Hacking

Cisco CCNA, Cisco CCNA Security, NDG Linux Basics by Cisco, Security Trainings • The trainings can be online, in person (at our headquarters in Ploiesti), or at the customer's location for more than 5 students • We have gathered over 8 years of experience in the IT field, both in theoretical and practical • Instructor's trainings and certifications: Certified Ethical Hacker, CCNA, CCNA Security, CCNP Routing, CCNP Switching, Advanced Linux&InfoSEC, VMWare vSphere Install, Configure, Manage, Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.

Uploaded by

gabyavra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Web Application Hacking.

Network Infrastructure Hacking


www.ituniversity.ro

Who are we?

For whom are those courses


intended?

What you will learn?

Network Infrastructure Hacking

Web Application Hacking

How to register?

Contact information - get in touch


with us
2
Content

We provide a vast portfolio of courses:


Cisco CCNA, Cisco CCNA Security, NDG
Linux Basics by Cisco, Security Trainings

The trainings can be online, in person (at


our headquarters in Ploiesti), or at the
customer's location for more than 5
students
3
Who are we?

We have gathered over 8 years of


experience in the IT eld, both in theoretical
and practical

Instructor's trainings and certications:


Certied Ethical Hacker, CCNA, CCNA
Security, CCNP Routing, CCNP Switching,
Advanced Linux&InfoSEC, VMWare
vSphere Install, Congure, Manage,
Microsoft Certied Technology Specialist
(MCTS/MCP 70-642): Microsoft Windows
Server 2008 Network Infrastructure, etc.
4
Who are we (cont.)?

Network administrators

Web developers

System administrators

IT Security Managers

Students and IT passionates


5
For whom are those courses intended?
Think like a hacker and avoid being hacked!

You will learn hacking tools, methodologies


and techniques

Requirements: basic networking, basic linux

The course is a good start for a security career

The trainings has both theoretically and


practical approaches
6
What you will learn?
Curriculum and labs:

Chapter 1: Introduction to Ethical Hacking, Footprinting and
Reconnaissance
Chapter 2: Scanning Networks+Enumeration
Chapter 3: System Hacking
Chapter 4: Snifng
Chapter 5: Metasploit
Chapter 6: Trojans, Backdoors, Viruses and Worms
Chapter 7: Cryptography
Chapter 8: Hacking Wireless Networks. Penetration Testing
Chapter 9: Practical Exam
7
Network Infrastructure Hacking

Learn how to use hacking tools, attacking


methodologies and techniques

The labs are both with step-by-step and


challenge or"capture the ag" like, with
network access to target virtual machines that
have to be hacked into
8
Network Infrastructure Hacking
Course and labs print screens:
9
Network Infrastructure Hacking

How to hack a network, if it's rewall protected and you can't just
bypass it?

Sometimes the only way into a network is trough it's web servers

Attack the web servers, get control over it and then attack the network
from the server. Ok, but how? This is all this course is all about

It sounds easy doesn't it? Even it isn't, come and nd out how you can
do it!
10
Web Application Hacking
Curriculum:

Core problems (Causes. Defenses)

Web Technologies (HTTP Protocol, Web Functionality, Encoding)

Mapping (Spidering and Analyzing)

Attacking Authentication (Technologies, Flaws, Fixes, Brute Force)

Attacking Session Management (State, Tokens, Flaws)

Attacking Access Controls (Common Vulnerabilities, Attacks)

Attacking Data Stores (SQL Injection, Bypassing Filters, Escalation)

Bypassing Client-Side Controls (Browser Interception, HTML interception, Fixes)

Attacking the server (OS command Injection, Path Traversal, Mail Injection, File Upload)

Attacking Application Logic

Cross Site Scripting

Attacking Users (CSRF, ClickJacking, HTML Injection)



Labs:

Spidering, Website Analyzer

Brute-Force

Session Hijacking via Mann-in-The-Middle

SQL Injection

Upload File and Remote Execution

Cross-Site Scripting (Stored + Reected, Creating your own Key Logger, Cookie Stealing, Preventing XSS)

CSRF (Change password trough CSRF vulnerability, Preventing CSRF)


11
Web Application Hacking
Curriculum and labs prints screens:
12
Web Application Hacking

Register on www.ituniversity.ro ("Inscriere")

Go to "Clase disponibile" and select the desired


course
13
How to register?

Find out more on www.ituniversity.ro

For details about price and availability:

E-mail us: [email protected]

Call us: 0040 724 485 985


14
Contact information - Get in touch with us

You might also like