0% found this document useful (0 votes)
70 views6 pages

Networking & Ethical Hacking WS

The Networking & Ethical Hacking course is a two-day workshop that provides foundational skills in computer networking and cybersecurity, covering both defensive and offensive security strategies. Participants will learn about networking fundamentals, ethical hacking techniques, and various tools used in the field, along with career and certification pathways. The course includes hands-on projects and culminates in a capstone project to reinforce learning outcomes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views6 pages

Networking & Ethical Hacking WS

The Networking & Ethical Hacking course is a two-day workshop that provides foundational skills in computer networking and cybersecurity, covering both defensive and offensive security strategies. Participants will learn about networking fundamentals, ethical hacking techniques, and various tools used in the field, along with career and certification pathways. The course includes hands-on projects and culminates in a capstone project to reinforce learning outcomes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Networking & Ethical Hacking

Course
(2 days Workshop)

Workshop

Introduction to Networking & Ethical Hacking Course

This course provides a comprehensive foundation with essential skills in computer


networking and cybersecurity, focusing on both defensive and offensive security
strategies. The course covers how networks function, common vulnerabilities, and
ethical hacking techniques used to identify and fix security flaws. Students learn to
perform vulnerability analysis, secure systems, and defend against cyber threats—all
while adhering to legal and ethical guidelines.

Workshop Day 01: NETWORKING


Module 01: Networking Fundamentals

 Introduction to Networking
 Types of Networks (LAN, WAN, MAN, PAN)
 Ethernet Cable
 Network Devices (Router, Switch, Hub, Bridge, Modem)

Module 02: Network Services

 HTTP Overview
 HTTPs
 FTP Overview
 SFTP
 SMTP
 POP3
 IMAP
 RDP
 DHCP & DNS
 SSH
 Telnet
Module 03: IP Addressing & Subnetting

 MAC vs IP Address
 IPv4 Address & IPV6
 IPV4 classes
 Public vs Private Ips
 NAT
 Subnetting
 Special IP Addresses (Loopback, Broadcast, Multicast)

Module 04: Network Design & Topologies

 Star, Mesh, Ring, Bus Topologies


 Redundancy and High availability
 Fault Tolerance

Module 05: Network Models

 TCP & UDP


 OSI Model (7 Layers)
 TCP/IP Model

Module 06: Network Security

 Firewalls and Access Control Lists (ACLs)


 Cryptography
 VPNs and Tunnelling Protocols
 Common Attacks
 CIA Triad
 SSL & TLS

Module 07: Anonymity

 Anonymity
 Dark web & Block Chain

Module 08: Emerging Technologies

 NFV (Network Functions Virtualization)


 IoT Networking
 5G & Edge Networking

Module 09: Career & Certification Pathways

 Industry Certifications
 Career Pathways

Workshop Day 02: ETHICAL HACKING


Module 01: Introduction to Ethical Hacking

 What is Ethical Hacking?


 Types of Hackers
 Types of Hacking
 Benefits of Ethical Hacking
 Phases of Ethical Hacking

Module 02: Footprinting and Reconnaissance

 Passive and Active Recon


 DNS Interrogation
 Email Harvesting

Module 03: Scanning and Enumeration

 Network Scanning
 Vulnerability Scanning
 Banner Grabbing and OS Fingerprinting
 What is Enumeration?
 Services and Ports to Enumerate

Module 04: System Hacking

 Password Cracking Techniques


 Privilege Escalation
 Keyloggers and Spyware
 Steganography

Module 05: Sniffing and Spoofing

 Packet Sniffing
 ARP Poisoning
 MAC Spoofing
 DNS Spoofing or DNS Cache poisoning

Module 06: Malware and Backdoors


 Types of Malwares: Virus, Worm, Trojan
 Creating and Using Backdoors
 RATs and Botnets
 Malware Detection and Prevention

Module 07: Social Engineering

 Phishing, Vishing, Tailgating


 Human-based and Computer-based Techniques
 Countermeasures and Awareness Training

Module 08: Web Application Hacking

 OWASP Top 10
 SQL Injection, XSS, CSRF

Module 09: Wireless Network Hacking

 Rogue Access Points


 Evil Twin Wireless

Module 10: Encryption

 Encryption
 Hashing
 Public Key Infrastructure

Module 11: PenTesting & Ethical Hacking Terminologies

 Types: Black Box, White Box, Grey Box


 Phases of PenTesting
 Writeup/Report
 TTP, CVE, CVSS & NVD
 Cyber Kill Chain
 Cyber Threat Intelligence

Module 12: Tools & Framework

 Kali Linux and Parrot OS


 Metasploit Framework
 Wireshark, Netcat, Nikto, John the Ripper

Module 13: Career & Certification Pathways

 Certification
 Practise Platforms
 Building a Pentesting Lab
 Build a SOC environment

Course Training Plan:

Week 1

Day Topic
Day 1 Networking Fundamentals
Day 2 Network Design & Topologies

Day 3 Reconnaissance & OSINT Tools – WHOIS & NSLookup

Maltego & The Harvester


Day 4
Visualize connections between digital entities

Day 5 Combine WHOIS, NSLookup, Dorking, Harvester on a test domain

Week 2

Day Topic
Day 1 Scanning & Discovery Tools

Day 2 Vulnerability scanning with GUI

Day 3 Write a short report on method + findings


 Set up OpenVAS on Kali or Docker
Day 4  Scan for vulnerabilities on test machines

Scan a test network (Metasploitable, OWASP VM) using Nmap,


Day 5
Nessus, and OpenVAS

Week 3

Day Topic
Day 1 Brute force vs dictionary vs hybrid attacks
Day 2 How rainbow tables work vs hashing
Day 3 DOS &DDOS simulation on a target
Day 4 Steganography
Day 5 Phishing & Phishing Analysis
Week 4

Day Topic
Day 1 Packet sniffing, filters, TCP handshakes
Day 2 Tcpdump - CLI packet sniffer
Day 3 Capture and export packets for analysis in Wireshark
Capture and analyze HTTP, DNS, FTP traffic
Day 4
Extract data from PCAP
Day 5 Write a short report on method + findings

Learning Outcomes

 Proficiency in Network and Ethical hacking concepts & tools


 3 Mini Projects + 1 Capstone
 Career guidance from experienced professionals
 Certification of Completion

You might also like