Code: OTH_GOC3 Security OTHER Difficulty: Advanced

Network Security – Ethical Hacking

1 050,00 €
without VAT

Date does not suit me
Contact us using the form here.

Goals

This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform. At least half of the time that the students spend in the classroom is dedicated for hands-on practical exercises. Students practice attacks against the Active Directory, DNS and DHCP server, SMB/CIFS servers and clients, VPN connections, Wireless networks, SSL protected servers and others. Students will capture the user credentials and other traffic from wired (switched), wireless as well as WAN connections. We will explain in great detail the misuse of passwords and hashes and use encryption cracking technics such as brute-force, rainbow tables, dictionary attacks and distributed attacks using clusters and graphical cards. The goal of the training is to provide attendees with precise understanding of common vulnerabilities found in Windows based networks and teach how to prevent such attacks and harden the network. The course is taught by our top level security professional (MCT, MCSA, MCSE, MCITP, CEH) who specializes on security auditing, infrastructure security assessment and hardening.

The course is designed for network administrators who are responsible for network security and who want to get practical experience of thinking and methodology used by attackers that is neccessary to understand in order to implement proper security countermeasures. This week of hacking training will the best insight into the attacker’s mind and can offer a deep dive security experience that standard safety courses and official Whitepapers explain only in theory. The course can recommend and administrators of the network infrastructure for a deeper understanding of the principles of TCP / IP protocol. The TCP / IP quick intro and network data analysis make this training perfect for everyone with the knowledge and experience level course GOC2 or at least one year's experience with the administration of network services and operating systems. During the course, we use tools for Windows and their equivalents in the Linux environment, but thanks to the detailed explanations and instructions during the course there is no requirement of previous knowledge of linux systems.

*pPlace of the course: Počítačová škola Gopas, Kodaňská 1441/46, 101 00, Praha 10

Duration

5 days (8h/day)

Requirements

The course is designed for network administrators who are responsible for network security and who want to get practical experience of thinking and methodology used by attackers that is neccessary to understand in order to implement proper security countermeasures. This week of hacking training will the best insight into the attacker’s mind and can offer a deep dive security experience that standard safety courses and official Whitepapers explain only in theory. The course can recommend and administrators of the network infrastructure for a deeper understanding of the principles of TCP / IP protocol. The TCP / IP quick intro and network data analysis make this training perfect for everyone with the knowledge and experience level course GOC2 or at least one year's experience with the administration of network services and operating systems. During the course, we use tools for Windows and their equivalents in the Linux environment, but thanks to the detailed explanations and instructions during the course there is no requirement of previous knowledge of linux systems.

Contents

Introduction

  • Repeating the TCP/IP stack
  • Capturing data in a network analyzer
  • Searching information from Internet sources
  • How to start malware or manual attacks using services to start mission critical tasks

Analysis of the environment and the first attacks

  • Analysis of the environment susceptible to social engineering
  • Scanning network services by scanning for open ports and banners
  • The enumeration of operating systems and services
  • Explanation and attacking well chosen targets using the ARP poisioning using both Microsoft Windows and Linux operating systems
  • Defensive countermeasures

Passwords and breaking

  • Principles of storing passwords in operating systems
  • Transferring passwords for network authentication
  • Authentication methods downgrade
  • The attacks on passwords using brute force CPU, graphics cards and distributed attack
  • Rainbow Tables - principles of searching, a method of generating specific environments and types of attacks, the time / memory tradeoff effect

Wireless Networks

  • Types of frames used in wireless networks
  • Analysis of wireless networks in range
  • Misuse of unauthorized frames
  • Injection and monitor mode of WiFi cards
  • Attacks on WEP networks
  • Attacks on WPA1 PSK and WPA2 PSK network
  • Breaking EAPOL frames using graphics cards
  • Alien APs
  • WPS

Advanced attacks

  • Sending fake certificate, importing the fake root certificate authorities and the creation of fake certificates for breaking the HTTPS security
  • Stripping the SSL protocols
  • Exploitation of remote unknown systems
  • Hiding your tools and backdoors using rootkits

Tailored trainings

Is this training not suitable for you and you did not find exactly what you are looking for? Contact us and we will help you.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

* required

Thank you for your interest.

We will do our best to answer and arrange a term.

Do you have a question?

Contact us for more detailed information.


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

* required

Thank you for your interest.

We will answer your request or comment as soon as possible.

Date request

Fill in the required information, submit a request and we will get back to you in regards to time.


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

* required

Thank you for your interest.

We will do our best to answer and arrange a term.

Training rooms

ALEF operates with training rooms match submarine's style to unexpected, unusual while still being smart and available to work in. We have several type of rooms for small groups and up to larger rooms with modern technical equipment and supportive technologies we provide.

We also deliver the high-quality multimedia sharing for efficient, effective virtual communication on a global scale. In the Competence Center is also available Spark Board. Cisco Sparkboard integrates the most common tools needed for team collaboration in physical meeting rooms into a single elegant device. It also combines white board, video or audio conference features.

All ALEF training centres operates with testing centre that provides full acess to take an exam and get certificate provided by our vendors. ALEF provides to our customer complete management and administration.

Training rooms – Prague

Team of lecturers

Our team - consisting of more than 50 instructors - offers a full range of technological knowledge in the field of routing, switching, security, collaboration and data centers. The expertise of instructors is evidenced by a range of top-level international certifications.

The uniqueness of our lecturers lies mainly in their extensive experience in connection with each project, allowing them to respond very flexibly to any question or suggestion from students, and to pass on their practical knowledge to the participants of these courses. Thanks to the synergy of the company’s reliable operation and many years of experience, we have been very flexible in responding to the changes prepared in the Cisco field, so we can guarantee you a wide range of certified courses that enable you and your colleagues to acquire the necessary know-how for future certification tests.


Karel PouzarKarel Pouzar

Senior Solution Architect - Cloud

AWS Certified Solutions Architect – Professional, AWS Certified Security – Specialty, AWS Certified SysOps Administrator – Associate, AWS Authorized Instructor Champion Cisco CCIE R&S #20198, CCNP Ent, CCNP SP

Karel is a Senior Solution Architect for Cloud at Alef. He has long been involved in infrastructure and its virtualization in large networks and data centres of service providers. In recent years, he has been involved in the design and implementation of hybrid Cloud solutions.  

He is an avid user and promoter of new technologies, which he capitalizes on as a Cloud Ambassador for the Expert Centre's Infrastructure Team. At the Alef Group, he is the lead trainer for AWS training, where he’s the AWS Authorised Instructor Champion.


Jan KopřivaJan Kopřiva

Team lead CSIRT - incident response and offensive security

Multiple certifications & M.Sc. in Cyber security, Multiple certifications & B.Sc. in Education and teaching, Author of numerous security courses

Jan Kopřiva is the team lead of an incident response and offensive security team at ALEF Group and an Incident Handler with the renowned SANS Internet Storm Center. Jan started his career as a blue teamer, but slowly moved into offensive security as well. His current professional interests lie mainly in the areas of security, which traditionally fall within the purview of purple teams. He has authored multiple security courses as well as numerous research papers and articles focused on different aspects of cyber security and he regularly speaks at security conferences and other industry events.


Jan JanovicJan Janovic

Team Leader, DC-NET

Double CCIE DC|R&S #55858, CCNP DevNet, CCSI #35493, AWS Solution Architect and Developer Associate

Honza is a Datacenter Networking Teamleader at Alef. Together with his team, he specializes in a variety of networking solutions, primarily built on the Cisco Nexus switch platform - traditional vPC architecture, VXLAN BGP EVPN factories, and Cisco ACI. He also focuses on analytical tools, programmability and the automation of all these solutions, as well as their integration with the public cloud. In 2020, he became the Alef Group's first holder of the new CCNP DevNet certification, and also received the DevNet500 award for being among the top 500 DevNet certified engineers worldwide. In 2021 he became the only Double CCIE holder in the ALEF group, and the first in the world to pass any new version of the CCIE exam following changes to Cisco's certification program in February 2020. Honza has logged more than 1,000 hours in the Czech Republic, Slovakia and Romania.


Jiří ŠolcJiří Šolc

Enterprise/Solution Architect

CCDA, CCNP Collaboration, AWS, ITIL, TOGAF, ArchiMate, IPMA

Jirka works at Alef as an Enterprise/Solution Architect, and is responsible for the comprehensive development of ICT solutions for key customers. He has over 10 years’ experience in technical, consulting and management practice. He has been involved in the design, implementation and management of a number of infrastructure, security, communications and digital transformation projects.

His specialties include the interconnection of the business and ICT worlds through Enterprise and Solution Architecture. This involves extensive communication with people in different roles across roles and organisational structures, the analysis of complex ICT environments, the preparation of projects including advocacy for their benefits, budgets, and interdependencies, and overall strategic ICT development planning. You will see him regularly speaking at conferences and workshops.


OUR KNOWLEDGE IS YOUR FUTURE

280 +

Courses

20+

Training rooms

10000+

Certificates

50+

Certified lecturers

8

Countries

Cisco Learning Partner    Comptia F5 AWS Microsoft vmware palo alto

CONTACT

ALEF NULA, a.s.
Pernerova 691/42, 186 00 Praha 8
+420 225 090 111
email