You are on page 1of 14

Web Application Hacking.

Network Infrastructure Hacking


www.ituniversity.ro

Content

Who are we?


For whom are those courses
intended?
What you will learn?
Network Infrastructure Hacking
Web Application Hacking
How to register?
Contact information - get in touch
with us
2

Who are we?

We provide a vast portfolio of courses:


Cisco CCNA, Cisco CCNA Security, NDG
Linux Basics by Cisco, Security Trainings
The trainings can be online, in person (at
our headquarters in Ploiesti), or at the
customer's location for more than 5
students

Who are we (cont.)?

We have gathered over 8 years of


experience in the IT field, both in theoretical
and practical
Instructor's trainings and certifications:
Certified Ethical Hacker, CCNA, CCNA
Security, CCNP Routing, CCNP Switching,
Advanced Linux&InfoSEC, VMWare
vSphere Install, Configure, Manage,
Microsoft Certified Technology Specialist
(MCTS/MCP 70-642): Microsoft Windows
Server 2008 Network Infrastructure, etc.
4

For whom are those courses intended?


!
!

Network administrators
Web developers
System administrators
IT Security Managers
Students and IT passionates

What you will learn?


Think like a hacker and avoid being hacked!
!

You will learn hacking tools, methodologies


and techniques
Requirements: basic networking, basic linux
The course is a good start for a security career
The trainings has both theoretically and
practical approaches

Network Infrastructure Hacking


Curriculum and labs:
!

Chapter 1: Introduction to Ethical Hacking, Footprinting and


Reconnaissance
Chapter 2: Scanning Networks+Enumeration
Chapter 3: System Hacking
Chapter 4: Sniffing
Chapter 5: Metasploit
Chapter 6: Trojans, Backdoors, Viruses and Worms
Chapter 7: Cryptography
Chapter 8: Hacking Wireless Networks. Penetration Testing
Chapter 9: Practical Exam
7

Network Infrastructure Hacking

Learn how to use hacking tools, attacking


methodologies and techniques
The labs are both with step-by-step and
challenge or"capture the flag" like, with
network access to target virtual machines that
have to be hacked into

Network Infrastructure Hacking


Course and labs print screens:

Web Application Hacking

How to hack a network, if it's firewall protected and you can't just
bypass it?
Sometimes the only way into a network is trough it's web servers
Attack the web servers, get control over it and then attack the network
from the server. Ok, but how? This is all this course is all about
It sounds easy doesn't it? Even it isn't, come and find out how you can
do it!

10

Web Application Hacking


Curriculum:
Core problems (Causes. Defenses)
Web Technologies (HTTP Protocol, Web Functionality, Encoding)
Mapping (Spidering and Analyzing)
Attacking Authentication (Technologies, Flaws, Fixes, Brute Force)
Attacking Session Management (State, Tokens, Flaws)
Attacking Access Controls (Common Vulnerabilities, Attacks)
Attacking Data Stores (SQL Injection, Bypassing Filters, Escalation)
Bypassing Client-Side Controls (Browser Interception, HTML interception, Fixes)
Attacking the server (OS command Injection, Path Traversal, Mail Injection, File Upload)
Attacking Application Logic
Cross Site Scripting
Attacking Users (CSRF, ClickJacking, HTML Injection)

Labs:
Spidering, Website Analyzer
Brute-Force
Session Hijacking via Mann-in-The-Middle
SQL Injection
Upload File and Remote Execution
Cross-Site Scripting (Stored + Reflected, Creating your own Key Logger, Cookie Stealing, Preventing XSS)
CSRF (Change password trough CSRF vulnerability, Preventing CSRF)
11

Web Application Hacking


Curriculum and labs prints screens:

12

How to register?
!

Register on www.ituniversity.ro ("Inscriere")


Go to "Clase disponibile" and select the desired
course

13

Contact information - Get in touch with us


!

Find out more on www.ituniversity.ro


For details about price and availability:
E-mail us: contact@ituniversity.ro
Call us: 0040 724 485 985

14

You might also like