Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
How to test the security of networks and services
- Penetration testing – what is it?
- Penetration testing versus audit – similarities, differences, and what is appropriate?
- Practical challenges – what can go wrong?
- Scope of tests – what do we want to check?
- Sources of best practices and recommendations.
Penetration testing – reconnaissance
- OSINT – obtaining information from public sources.
- Passive and active network traffic analysis methods.
- Identifying services and network topology.
- Security systems (firewalls, IPS/IDS systems, WAF, etc.) and their impact on testing.
Penetration testing – vulnerability hunting
- Recognizing systems and their versions.
- Searching for vulnerabilities in systems, infrastructure, and applications.
- Assessing vulnerabilities – 'does it hurt?'
- Exploit sources and possibilities for customization.
Penetration testing – attack and gaining control
- Types of attacks – how they are conducted and their consequences.
- Attacks using remote and local exploits.
- Attacks on network infrastructure.
- Reverse shell – managing a compromised system.
- Privilege escalation – becoming an administrator.
- Ready-made 'hacking tools'.
- Analyzing a compromised system – interesting files, saved passwords, private data.
- Special cases: web applications, Wi-Fi networks.
- Social engineering – how to 'break' a human if systems can't be compromised?
Penetration testing – erasing traces and maintaining access
- Logging and activity monitoring systems.
- Cleaning logs and erasing traces.
- Backdoor – how to leave yourself an open entry point.
Penetration testing – summary
- Preparing the report and its structure.
- Delivering and discussing the report.
- Verifying the implementation of recommendations.
Requirements
- Knowledge of basic networking concepts (IP addressing, Ethernet, core services – DNS, DHCP) and operating systems.
- Knowledge of Windows and Linux (basic administration, system terminal).
Target Audience
- Individuals responsible for the security of networks and services.
- Network and system administrators wishing to learn security testing methods.
- Anyone interested in the topic.
28 Hours