Penetration Testing

Course Description:
This course is an introduction to the ethical hacking process, also known as “penetration testing”. The course is highly practical with hands-on labs but it won’t neglect the theory; During the course we will simulate real world attacks on a network, application, or system that has vulnerabilities and weaknesses. The aim of the course is to understand, the attacking process and also the cyber threats in order to effectively protect complex networks and systems, by identifying miss-configurations, weaknesses and vulnerabilities. More specifically this course covers the following topics:
• Introduction to Penetration Test Methodology
• Reconnaissance Techniques
• Scanning Techniques
• Gaining Initial Access Techniques (Exploitation, Brute forcing, Client side attack)
• Maintain access (Trojans, rootkits, back doors)
• AV, EDR bypass Techniques
• Post exploitation Techniques
• Lateral Movement
• Network pivoting
• Covering tracks

Labs: By using hands-on labs and step-by-step technical walkthroughs, we’ll cover the real-world tools and techniques used by today’s penetration testers professionals.

Course Coordinator: Prof. Panayiotis Kotzanikolaou