COURSE OVERVIEW

Passwords are an integral part of digital security but it’s important to know their vulnerabilities to maintain strong cyber security. In this training course, you’ll explore different types of password attacks and how to use them in a penetration test and security assessment. Through practical experience, you’ll understand how malicious password attacks occur and what you can do to prevent them.

You’ll begin by covering the basic theory of password protection by understanding topics on cryptography, password entropy and hashing. You’ll then put this into practice by learning how to crack passwords. You’ll learn how to set up a small environment for security testing where you’ll delve into a diverse range of methodologies to bypass passwords, including brute force attack, dictionary attack, rainbow table attack and keylogger.

As you learn how to crack a variety of password types, you’ll become familiar with the tools required to prevent password attacks.. What’s more, you’ll learn how to create strong, unforgettable passwords that offer more security. By the end of the course, you’ll understand the theory behind password attacks, how to create an uncrackable password, and the solutions and techniques you can implement to prevent attacks in future.

COURSE OBJECTIVES

By the end of the course, you‘ll be able to…

  • Understand how to set up a small environment for security testing
  • Understand how to bypass passwords using Brute Force Attacks, Dictionary Attacks, Rainbow table attacks and key loggers
  • Understand how to use different tools to perform password attacks
  • Understand how to prevent Brute Force Attacks, Dictionary Attacks, Rainbow table attacks and sniffing via key loggers how to create strong passwords that you will never forget
  • Explore tools to help you prevent password attacks and/or create a strong password

TARGET AUDIENCE

This course is designed for beginner and intermediate level learners interested in improving their understanding of cyber security and how to create secure passwords.

You should be familiar with computers, bash (or similar), and be able to install Windows + Linux.

WHAT SOFTWARE OR TOOLS DO YOU NEED?

To complete this course, you will need:

  • Operating system: Mac, Linux, Windows
  • Browser: Firefox, Chrome
  • VirtualBox, Latest Version
  • Windows 10 Developer or Evaluation VM for/VirtualBox
  • Kali ISO

COURSE OUTLINE

Introduction to Password Security and Types of Password Attacks

  • Welcome to the Expert Track
  • Welcome to the Course
  • Bypassing Your First Password
  • Brute Force Attacks
  • Dictionary Attacks
  • Rainbow Table Attacks

 

Password Security in the Real World

  • Introduction
  • The Downside of Passwords
  • Remedies and Mitigations
  • Case Studies

Delivery Format

Online, Offline ( Locally and Overseas)

Apply for Course