Course Summary
This is our entry-level infrastructure foundation course. A number of tools and techniques, backed up by a systematic approach on the various phases of hacking will be discussed during so if you would like to step into a career of Ethical Hacking / Pen Testing with the right amount of knowledge, then this is a great step forward.
Trained delegates can:
• Use industry-standard tools, like Nmap, Hydra, and Metasploit, to perform penetration testing against your infrastructure.
• Find and exploit vulnerabilities in your infrastructure, including those that would lead to initial exploitation, attack chaining, privilege escalation, persistence, and more.
• Identify and recommend remediations for common misconfigurations.
• Understand and explain infrastructure-based hacking methodology for both Windows and Linux and tie this to attacks across the kill chain.
• Adapt their approach for different operating systems.
• Relate security testing and other offensive and defensive measures back to authentic attack vectors.
THE ART OF PORT SCANNING
• Basic concepts of Hacking Methodology
• Enumeration techniques and Port scanning
THE ART OF ONLINE PASSWORD ATTACKS
• Configure online password attack
• Exploiting network service misconfiguration
THE ART OF HACKING DATABASES
• Mysql, Postgres
• Attack chaining techniques
METASPLOIT BASICS
• Exploitation concepts, Manual exploitation methodology
• Metasploit framework
PASSWORD CRACKING
• Understanding basic concepts of cryptography
• Design offline brute force attack
HACKING UNIX
• Linux vulnerabilities, misconfigurations
• Privilege escalation techniques
HACKING APPLICATION SERVERS ON UNIX
• Web server misconfiguration
• Multiple exploitation techniques
HACKING THIRD PARTY CMS SOFTWARE
• CMS Software
• Vulnerability scanning & Exploitation
WINDOWS ENUMERATION
• Windows Enumeration techniques & Configuration Issues
• Attack chaining
CLIENT-SIDE ATTACKS
• Various Windows client-side attack techniques
PRIVILEGE ESCALATION ON WINDOWS
• Post exploitation
• Windows Privilege escalation techniques
HACKING APPLICATION SERVERS ON WINDOWS
• Web server misconfiguration
• Exploiting Application servers
POST EXPLOITATION
• Metasploit Post exploitation techniques
• Window 10 Security features & different bypass techniques
HACKING WINDOWS DOMAINS
• Understanding Windows Authentication
• Gaining access to Domain Controller
Other Popular Courses
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Intermediate
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 4 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT
Next Generation Mindfulness
- Duration: 1 Days
- Language: English
- Level: Foundation
- Exam: NGM