Reconnaissance
Scanning of IPs, ports, subnets, output to a file & advanced options
Offensive
Simple and more advanced DoS attacks using hping3 and GoldenEye
ARP spoofing, DHCP Starvation, DHCP Rogue Server using arpspoof and Yersinia
Using Hydra to attack SSH, FTP, HTTP and WordPress
Attacks using msfconsole and GoledEye
Defensive
Implementing rate limiting, firewall rules, intrusion detection system (IDS)
Limiting login attempts, 2FA, HTTPS connection, WAF, backups, scanning
Linux
Manipulation of the files and folders in Linux
Basic concepts
Basic commands and concepts for everyday use such as grep, aliases, extensions
Adding, editing or removing file permissions and users
Networking commands such as ifconfig, /proc and tracerout
Network configurations inspection, interfaces, SSH
Navigation, file management, permissions, users & groups, applications, processes, logs, networking, FTP, apache2
Networking
Wiring, IP addresses, telnet, ssh & ping
Ensuring end-to-end connectivity in a very simple network
Ensuring end-to-end connectivity in a more advanced network
Familiarization with Static Routes and ensuring end-to-end connectivity
Configuration of static routes in a complex network
Analysis of traffic network using TCPdump and Wireshark