Get in Touch

Course Outline

How to Test Network and Service Security

  • Penetration Testing – What Is It?
  • Penetration Testing vs. Audit – Similarities, Differences, and Choosing the Right Approach
  • Practical Challenges – What Can Go Wrong?
  • Scope of Testing – What Do We Want to Assess?
  • Sources of Best Practices and Recommendations

Penetration Testing – Reconnaissance

  • OSINT – Gathering Information from Public Sources
  • Passive and Active Network Traffic Analysis Methods
  • Identifying Services and Network Topologies
  • Security Systems (Firewalls, IPS/IDS, WAF, etc.) and Their Impact on Testing

Penetration Testing – Vulnerability Discovery

  • System and Version Identification
  • Searching for Vulnerabilities in Systems, Infrastructure, and Applications
  • Vulnerability Assessment – Determining Potential Impact
  • Sources of Exploits and Customization Options

Penetration Testing – Exploitation and Gaining Control

  • Types of Attacks – Execution Methods and Consequences
  • Remote and Local Exploitation Attacks
  • Attacks on Network Infrastructure
  • Reverse Shell – Managing a Compromised System
  • Privilege Escalation – How to Become an Administrator
  • Ready-Made "Hacking Tools"
  • Analysis of a Compromised System – Interesting Files, Stored Passwords, Private Data
  • Special Cases: Web Applications, Wi-Fi Networks
  • Social Engineering – How to "Break" Humans When Systems Cannot Be Compromised

Penetration Testing – Covering Tracks and Maintaining Access

  • Logging and Activity Monitoring Systems
  • Clearing Logs and Erasing Traces
  • Backdoor – How to Leave an Open Entry Point

Penetration Testing – Summary

  • Report Preparation and Structure
  • Report Delivery and Consultation
  • Verification of Recommendation Implementation

Requirements

  • Familiarity with fundamental concepts related to computer networks (IP addressing, Ethernet, basic services such as DNS and DHCP) and operating systems.
  • Knowledge of Windows and Linux (basic administration, system terminal).

Target Audience

  • Individuals responsible for the security of networks and services.
  • Network and system administrators seeking to learn security testing methodologies.
  • Anyone interested in the subject.
 28 Hours

Related Categories