Network Penetration Testing & Countermeasures

Dates: May 13, 2013 - May 17, 2013
Meets: Monday-Friday from 8:30 AM to 4:30 PM, 5 sessions
Hours: 35.00
CEUs: 3.50
Location: Auburn Center for Developing Industries
Instructor: IT Training Solutions, LLC
Fee: $2,499.00

Sorry, this course is inactive. Please contact our office to see if it will be reinstated, or if alternative classes are available.

Course Description


Network Penetration Testing & Countermeasures is a hands-on, intensive, five-day workshop immersing students in the methodologies and application of ethical hacking concepts, techniques, and tools. The ethical hacking methodology used in this class includes: footprinting, scanning, enumeration, exploitation, and post-exploitation. Countermeasures to mitigate the various hacking techniques are emphasized. When students complete the class they will have hands-on experience applying the best of breed security tools in the context of an ethical hacking methodology, using various ethical hacking concepts and techniques.

This course will significantly benefit systems administrators, network administrators, auditors, security professionals, site administrators, and anyone who is concerned about the integrity and security of their systems and network infrastructure, as well as those interested in systems and application security.


Each topic listed below includes a brief theoretical discussion, lab exercises, and common mitigation techniques/countermeasures. Both Windows-based and Linux-based attack tools will be used.

DAY 1:

1. Introduction:
a. Course goals and objectives
b. Additional resources (both online and print)
c. Penetration testing certification programs
d. Various penetration testing lab environments and system configurations
e. Introduction to ethical hacking
f. Ethical hacking methodologies
g. Penetration testing models
h. Penetration testing preparation
i. Penetration testing reports

2. Footprinting: Discuss and illustrate various footprinting concepts, techniques, tools, and countermeasures:
a. Introduction to footprinting
b. Footprinting objectives
c. Footprinting analysis

DAY 2:

3. Scanning: Discuss and illustrate various scanning concepts, techniques, tools, and countermeasures:
a. Introduction to scanning
b. Scanning objectives
c. Scanning techniques

DAY 3:

4. Enumeration: Discuss and illustrate various enumeration concepts, techniques, tools, and countermeasures:
a. Introduction to enumeration
b. Enumeration objectives
c. Enumeration techniques (including protocols and passwords)

5. Exploitation: Discuss and illustrate various exploitation concepts, techniques, tools, and countermeasures:
a. Introduction to exploitation
b. Exploitation objectives
c. Exploitation techniques

DAY 4:

6. Post-Exploitation: Discuss and illustrate various post-exploitation concepts, techniques, tools, and countermeasures:
a. Maintaining access
b. Expanding influence
c. Covering your tracks

DAY 5:

7. Penetration Test a. Students will be given 4-5 hours to apply the concepts, techniques, and tools discussed/used the preceding four days against various targets

Other Topics Discussed Throughout Class:
1. Cryptography
2. Mobile
3. Security Architectures
4. Hacking laws
5. Intrusion Detection/Prevention Systems, firewalls, honeypots/honeynets
6. Malware
7. Physical security
8. Policies and Procedures
9. Social Engineering
10.Wireless Architecture and Security


Familiarity with:
- The core TCP/IP protocols (e.g., TCP, HTTP)
- Windows and Linux command-line interfaces

Office of Professional & Continuing Education | 301 OD Smith Hall | Auburn, Alabama 36849
Phone: (334) 844-5100 | Fax: (334) 844-3101 | Email:
Privacy | Copyright ©