Duração:
3 dias
Próxima Data:
28 a 30 Jul 2025
Local:
Online
Descrição
This is our entry-level infrastructure security testing course and also a recommended pre-requisite course before enrolling for our “Advanced Infrastructure Hacking” course. This foundation course familiarises the attendees with the basics of network hacking. A number of tools and techniques, backed up by a systematic approach on the various phases of hacking will be discussed during this course. If you would like to step into a career of Ethical Hacking / Pen Testing with the right amount of knowledge, this is the right course for you.
This course introduces the attendees with a wealth of hacking tools and techniques crucial in getting started in this dynamic field of hacking. The course begins with laying a foundation for everyone by discussing the basic concepts and gradually builds up to the level where attendees not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of the concepts on how these tools work and therefore ready to face the real world.
*PVP por participante. A realização do curso nas datas apresentadas está sujeita a um quórum mínimo de inscrições.
Destinatários
- Students and graduates: improve your employability and enhance your CV
- Infrastructure penetration testers (1-2 years’ experience): build up your ability with the guidance of experienced pentesters and researchers
- Penetration testers in other fields (e.g., web, mobile): develop your infrastructure hacking skills and knowledge
- Network admins: understand how your environment could be attacked
- SOC analysts and engineers: develop your awareness of potential indicators of compromise (IoCs) and more complex malicious behaviors
- Security/IT managers and team leads: update your knowledge of the threat landscape
-
Área: Cybersecurity
-
Certificação Associada: Check Point Certified Pen Testing Expert (CCPE)
Programa:
THE ART OF PORT SCANNING
- Methodology: basic concepts of hacking
- Enumeration techniques and port scanning
THE ART OF ONLINE PASSWORD ATTACKS
- Configure online password attack
- Exploiting network service misconfiguration
THE ART OF HACKING DATABASES
- MySQL, PostgreSQL
- Attack chaining techniques
METASPLOIT BASICS
- Exploitation concepts, Manual exploitation methodology
- Metasploit framework
PASSWORD CRACKING
- Understanding basic concepts of cryptography,
- Design offline brute force attack
HACKING UNIX
- Linux vulnerabilities, misconfiguration
- Privilege escalation techniques
HACKING APPLICATION SERVERS ON UNIX
- Web server misconfiguration
- Multiple exploitation techniques
HACKING THIRD PARTY CONTENT MANAGEMENT SYSTEM (CMS) SOFTWARE
- CMS Software
- Vulnerability scanning & exploitation
WINDOWS ENUMERATION
- Windows Enumeration techniques & Configuration Issues
- Attack chaining
CLIENT-SIDE ATTACKS
- Various Windows client-side attack techniques
PRIVILEGE ESCALATION ON WINDOWS
- Post exploitation
- Windows Privilege escalation techniques
HACKING APPLICATION SERVERS ON WINDOWS
- Web server misconfiguration
- Exploiting Application servers
POST EXPLOITATION
- Metasploit post-exploitation techniques
- Window 10 Security features & different bypass techniques
HACKING WINDOWS DOMAINS
- Understanding Windows Authentication
- Gaining access to Domain Controller
Pré-requisitos:
Delegates must have the following to make the most of the course:
- Basic knowledge of infrastructure application security (at least 1 year experience)
- Basic familiarity with common command line syntax
Partilha: