Course Summary
This course will teach you seasoned, hands-on red team and purple team skills. You will learn how to conduct environment reconnaissance, perform network and vulnerability scanning, execute password attacks, exploit vulnerabilities, escalate privileges, and manage Command and Control (C2) operations. Additionally, you will gain expertise in Active Directory attacks and work with penetration testing tools for both Linux and Windows systems, all within a time-restricted, real-world testing scenario.
Command and Control (C2) Communication and Evasion
The candidate will demonstrate mastery of communicating with a C2 framework and avoid detection.
Enterprise System Penetration Testing
The candidate will demonstrate mastery of evaluating entire enterprise systems for vulnerabilities, weaknesses, exploits, and misconfigurations.
Lateral Movement and Privilege Escalation
The candidate will demonstrate mastery of accessing hosts through lateral movement in a network and escalating privileges to gain access to otherwise inaccessible areas and objects.
Linux Penetration Testing Tools
The candidate will demonstrate mastery of using the Linux OS for penetration testing concepts and tools.
Network Access Exploitation
The candidate will demonstrate mastery of using tools to exploit vulnerabilities in a network to gain access to previously inaccessible hosts and segments.
Network Scanning for Pen Tests
The candidate will demonstrate mastery of scanning networks for information including hosts, software versions, vulnerabilities, and infrastructure for use in an offensive operation.
Offensive Operations Reconnaissance
The candidate will demonstrate mastery of gathering both sensitive and non-sensitive information from a variety of sources such as metadata, open-source intelligence, infrastructure documentation, and tool-based recon.
Password Analysis and Cracking
The candidate will demonstrate mastery of using password guessing and cracking tools to bypass authentication mechanisms and identify policy non-compliance.
Penetration Testing of Domain Environments
The candidate will demonstrate mastery of applying penetration testing techniques to Microsoft Active Directory environments.
Other Popular Courses
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Intermediate
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 4 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT
Next Generation Mindfulness
- Duration: 1 Days
- Language: English
- Level: Foundation
- Exam: NGM