rhino cloud cloud

Trainen bij TSTC tijdens corona/covid-19

Vanaf 1 maart 2021 verzorgen we onze trainingen weer hybride. Hierbij bepaal je zelf of je fysiek wilt deelnemen op onze locatie (beperkt aantal plekken per training) of Live Online via Cisco Webex. Onze locatie is uiteraard aangepast aan alle veiligheidseisen, van koffiemachine tot en met cursusplek, van desinfectie tot en met gespreide pauzes.

This 3 day advanced course assumes an understanding of the topics covered in CEH, ECSA-LPT and/or OSCP certification or equivalent experience.

Here students are tasked with pentesting environments free of “low hanging fruit” or readily exploitable issues making this a truly advanced pentesting / hacking course. Students will perform reconnaissance on environments with various filtering technologies. Topics such as advanced password attacks, client side attacks, and social engineering will be used for penetrating systems. The course will also cover common web application issues such as RFI, LFI, and XSS focusing on how to leverage them for a foothold on the webserver or the user’s browser. This course focuses heavily on post exploitation, moving from a limited user such as IIS__USER to SYSTEM, pivoting among systems and domains, gathering information and maintaining access.

Host based anti-virus avoidance will be covered as well as avoid IDS/IPS. Attacking mobile devices and networking equipment will be covered. Students will gain knowledge working with Metasploit and other tools as well as working in environments where they do not have access to Metasploit using build in tools such as PowerShell.

Outline:
Module 1: Review of basic penetration testing
Module 2: External reconnaissance of secure networks
Module 3: Client Side Attacks
Module 4: Social Engineering Attacks
Module 5: Password Attacks
Module 6: Mobile Attacks
Module 7: Web Attacks
Module 8: Attacking Networking Equipment
Module 9: PowerShell
Module 10: Post Exploitation: Privilege Escalation/Lateral Movement
Module 11: Post Exploitation: Information Gathering
Module 12: Post Exploitation: Pivoting
Module 13: Avoiding Detection
Module 14: Writing your own scripts, exploits and Metasploit modules
 

rhino cloud cloud

Scherpste prijs in slechts 2 stappen

Meer informatie en/of de actuele prijs van deze training opvragen is zo geregeld. We houden hierbij rekening met eventuele lopende acties, subsidies of relatiekortingen.

1 van 2 Stap 2
2 van 2

Inschrijven

Facturatiegegevens

Gegevens Cursist

* Verplicht