Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
How to test the security of networks and services
- Penetration testing – what is it?
- Penetration test vs. audit – similarities, differences, what is appropriate?
- Practical issues – what can go wrong?
- Scope of tests – what do we want to check?
- Sources of best practices and recommendations
Penetration testing – reconnaissance
- OSINT – obtaining information from open sources
- Passive and active methods of network traffic analysis
- Identifying services and network topology
- Security systems (firewalls, IPS/IDS systems, WAF, etc.) and their impact on testing
Penetration testing – vulnerability discovery
- Reconnaissance of systems and their versions
- Searching for vulnerabilities in systems, infrastructure, and applications
- Vulnerability assessment – 'what will it hurt'?
- Exploit sources and possibilities for customization
Penetration testing – attack and taking control
- Types of attacks – how they are conducted and their consequences
- Attack using remote and local exploits
- Attacks on network infrastructure
- Reverse shell – managing a compromised system
- Privilege escalation – becoming an administrator
- Ready-made 'hacking tools'
- Analyzing the compromised system – interesting files, saved passwords, private data
- Special cases: web applications, WiFi networks
- Social engineering – how to 'break' a person if the system can't be?
Penetration testing – covering tracks and maintaining access
- Logging and activity monitoring systems
- Cleaning logs and covering tracks
- Backdoor – how to leave an open entry point
Penetration testing – summary
- Preparing the report and its structure
- Delivering and consulting the report
- Verifying the implementation of recommendations
Requirements
- Familiarity with basic networking concepts (IP addressing, Ethernet, basic services – DNS, DHCP) and operating systems
- Familiarity with Windows and Linux (basic administration, system terminal)
Target Audience
- Individuals responsible for network and service security,
- Network and system administrators wishing to learn security testing methods
- Everyone interested in the topic.
28 Hours