Course Summary

In this course, you will gain in-depth knowledge of how to conduct penetration testing in a modern enterprise environment. You’ll learn how to effectively plan, prepare, and execute penetration tests using advanced tools and techniques. Through hands-on lab exercises, you will practice the strategies employed by experienced attackers and develop the skills needed to identify vulnerabilities and assess risks. These skills can be immediately applied to enhance your security practices within your organization.

The course is designed for penetration testers looking to strengthen their skillset, as well as for system administrators, defenders, and security professionals who want to understand how attackers operate. By learning the offensive mindset, defenders will better anticipate and mitigate potential threats. Every organization needs skilled security professionals who can detect weaknesses and strengthen defenses, and this course is tailored to prepare you for this crucial role. Both offensive and defensive teams share the same goal: to protect the organization from malicious actors.

In this course, you will learn how to:

Plan and prepare for enterprise-scale penetration tests, ensuring a structured and effective approach
Conduct thorough reconnaissance to support social engineering and phishing efforts, as well as to make informed decisions on attack targets
Leverage best-of-breed scanning tools to uncover hidden vulnerabilities and systems that might be overlooked by other methods
Safely perform password guessing and cracking techniques to gain initial access or deepen access to the network
Exploit vulnerabilities in target systems to measure the actual business risks associated with those weaknesses
Execute post-exploitation tactics to maintain and extend your presence on the compromised network
Apply privilege escalation methods on Windows or Linux systems, and within Windows domains, to gain higher levels of access
Conduct internal reconnaissance to identify additional attack surfaces and alternative attack vectors
Execute lateral movement and pivoting techniques to expand your reach within the organization’s network and uncover additional vulnerabilities
Crack passwords with advanced tools and techniques to escalate privileges or extend access across the network
Utilize various Command and Control (C2) frameworks to manage and execute operations on compromised hosts
Conduct targeted attacks on Microsoft Windows domains, including advanced Kerberos-based attacks such as Kerberoasting, Golden Ticket, and Silver Ticket attacks
Carry out reconnaissance within Azure environments and understand the unique threats they pose
Perform password spraying attacks against Azure Active Directory and use compromised credentials to move laterally
Develop detailed, actionable penetration test reports, including findings and recommendations for mitigating risks
By the end of this course, you will have developed the expertise to conduct penetration testing in real-world environments, perform in-depth assessments, and improve your organization’s security posture. You will gain critical skills in network security, vulnerability management, and exploitation techniques, all essential for identifying risks and securing systems effectively.

Advanced Password Attacks
The candidate will be able to use additional methods to attack password hashes and authenticate.
Attacking Password Hashes
The candidate will be able to obtain and attack password hashes and other password representations.
Azure Applications and Attack Strategies
The candidate will demonstrate an understanding of Azure applications and the attacks against them including federated and single sign-on environments and Azure AD authentication protocols
Azure Overview, Attacks, and AD Integration
The candidate will demonstrate an understanding of Azure Active Directory implementation fundamentals, common Azure AD attacks, and Azure authentication techniques
Domain Escalation and Persistence Attacks
The candidate will demonstrate an understanding of common Windows privilege escalation attacks and Kerberos attack techniques that are used to consolidate and persist administrative access to Active Directory.
Escalation and Exploitation
The candidate will be able to demonstrate the fundamental concepts of exploitation, data exfiltration from compromised hosts and pivoting to exploit other hosts within a target network.
Exploitation Fundamentals
The candidate will be able to demonstrate the fundamental concepts associated with the exploitation phase of a pentest.
Kerberos Attacks
The candidate will demonstrate an understanding of attacks against Active Directory including Kerberos attacks.
Metasploit
The candidate will be able to use and configure the Metasploit Framework at an intermediate level.
Moving Files with Exploits
The candidate will be able to use exploits to move files between remote systems.
Password Attacks
The candidate will understand types of password attacks, formats, defenses, and the circumstances under which to use each password attack variation. The candidate will be able to conduct password guessing attacks.
Password Formats and Hashes
The candidate will demonstrate an understanding of common password hashes and formats for storing password data.
Penetration Test Planning
The candidate will be able to demonstrate the fundamental concepts associated with pen-testing, and utilize a process-oriented approach to penetration testing and reporting.
Penetration Testing with PowerShell and the Windows Command Line
The candidate will demonstrate an understanding of the use of advanced Windows command line skills during a penetration test, and demonstrate an understanding of the use of advanced Windows Power Shell skills during a penetration test.
Reconnaissance
The candidate will understand the fundamental concepts of reconnaissance and will understand how to obtain basic, high level information about the target organization and network, often considered information leakage, including but not limited to technical and non technical public contacts, IP address ranges, document formats, and supported systems.
Scanning and Host Discovery
The candidate will be able to use the appropriate technique to scan a network for potential targets, and to conduct port, operating system and service version scans and analyze the results.
Vulnerability Scanning
The candidate will be able to conduct vulnerability scans and analyze the results.

Participants should have a foundational understanding of TCP/IP and basic familiarity with both Windows and Linux command-line interfaces prior to attending the class.

proctored exam 82 questions 3 hours Minimum passing score of 75%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?