Course Summary

This course will teach you seasoned, hands-on red team and purple team skills. You will learn how to conduct environment reconnaissance, perform network and vulnerability scanning, execute password attacks, exploit vulnerabilities, escalate privileges, and manage Command and Control (C2) operations. Additionally, you will gain expertise in Active Directory attacks and work with penetration testing tools for both Linux and Windows systems, all within a time-restricted, real-world testing scenario.

Command and Control (C2) Communication and Evasion
You will learn how to effectively communicate with a C2 framework while avoiding detection.

Enterprise System Penetration Testing
You will learn how to evaluate entire enterprise systems for vulnerabilities, weaknesses, exploits, and misconfigurations.

Lateral Movement and Privilege Escalation
You will learn how to access hosts through lateral movement in a network and escalate privileges to gain access to otherwise restricted areas and resources.

Linux Penetration Testing Tools
You will learn how to use the Linux OS for penetration testing, including concepts and tools.

Network Access Exploitation
You will learn how to use tools to exploit vulnerabilities in a network to gain access to previously restricted hosts and segments.

Network Scanning for Pen Tests
You will learn how to scan networks for information, including hosts, software versions, vulnerabilities, and infrastructure, for use in offensive operations.

Offensive Operations Reconnaissance
You will learn how to gather sensitive and non-sensitive information from a variety of sources such as metadata, open-source intelligence, infrastructure documentation, and tool-based reconnaissance.

Password Analysis and Cracking
You will learn how to use password guessing and cracking tools to bypass authentication mechanisms and identify policy non-compliance.

Penetration Testing of Domain Environments
You will learn how to apply penetration testing techniques specifically to Microsoft Active Directory environments.

The following courses or equivalent experiences are prerequisites GIAC Penetration Tester (GPEN)

proctored exam Open book, open notes Time limit 4 hour 25 CyberLive - hands-on, real-world practical testing. CyberLive testing creates a lab environment where cyber practitioners prove their knowledge, understanding, and skill using: Actual programs Actual code Virtual machines

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?