External Penetration Testing simulates the actions of an actual attacker exploiting vulnerabilities in the network security to determine what information is actually exposed to the outside world.

Objective

The objective of this lab is to help students in conducting network scanning, analyzing the network vulnerabilities, and maintaining a secure network.

 

You need to perform a network scan to:

Vulnerability Analysis
  • Check live systems and open ports
  • Perform banner grabbing and OS fingerprinting
  • Identify network vulnerabilities
  • Draw network diagrams of vulnerable hosts

Scenario

External Penetration Testing determines the possibility of network security attacks from outside of the network perimeter. It evaluates the organization'™s systems and network for vulnerabilities such as missing patches, unnecessary services, weak authentication, and weak encryption.

 

An attacker makes use of vulnerabilities to disrupt the confidentiality, availability or integrity of the network, thereby allowing the organization to address each weakness. Vulnerability scanning is a critical component of any penetration testing assignment.

 

As an expert Penetration Tester or a Security Administrator, you need to conduct penetration testing and list the threats and vulnerabilities found in an organization'™s network, perform port scanning, network scanning, and vulnerability scanning to identify IP/hostname, live hosts, and vulnerabilities. Then, you need to take specific preventive countermeasures to overcome them.


External Penetration Testing

The Security Analyst Exercises / External Penetration Testing contains the following Exercises:

  • Exploring and Auditing a Network Using Nmap

The Virtual Private Cloud for this Lab set utilizes:


Security Analyst Exercises are available as part of the following subscription:

CEHproductimage
Each subscription provides 6 months access to 15 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise. The Penetration Testing Exercises are designed to give the user an ultimate hands-on experience. Each exercise category above has it’s own Virtual Private Cloud that comes preconfigured with Vulnerable websites, Victim Machines, and the environment is LOADED with tools. Included in your network share are all the supporting tools required to practice in the Cyber Range / Lab environment.

Lab exercises are included for:

  • TCPIP Packet Analysis
  • Information Gathering
  • Vulnerability Analysis
  • External Penetration Testing
  • Internal Network Penetration Testing
  • Firewall Penetration Testing
  • IDS Penetration Testing
  • Password Cracking Penetration Testing
  • Social Engineering Penetration Testing
  • Web Application Penetration Testing
  • SQL Penetration Testing
Price: $199
Add to Cart
View Cart