Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
How to Test Network and Service Security
- Penetration Testing – What Is It?
- Penetration Testing vs. Audit – Similarities, Differences, and Choosing the Right Approach
- Practical Challenges – What Can Go Wrong?
- Scope of Testing – What Do We Want to Assess?
- Sources of Best Practices and Recommendations
Penetration Testing – Reconnaissance
- OSINT – Gathering Information from Public Sources
- Passive and Active Network Traffic Analysis Methods
- Identifying Services and Network Topologies
- Security Systems (Firewalls, IPS/IDS, WAF, etc.) and Their Impact on Testing
Penetration Testing – Vulnerability Discovery
- System and Version Identification
- Searching for Vulnerabilities in Systems, Infrastructure, and Applications
- Vulnerability Assessment – Determining Potential Impact
- Sources of Exploits and Customization Options
Penetration Testing – Exploitation and Gaining Control
- Types of Attacks – Execution Methods and Consequences
- Remote and Local Exploitation Attacks
- Attacks on Network Infrastructure
- Reverse Shell – Managing a Compromised System
- Privilege Escalation – How to Become an Administrator
- Ready-Made "Hacking Tools"
- Analysis of a Compromised System – Interesting Files, Stored Passwords, Private Data
- Special Cases: Web Applications, Wi-Fi Networks
- Social Engineering – How to "Break" Humans When Systems Cannot Be Compromised
Penetration Testing – Covering Tracks and Maintaining Access
- Logging and Activity Monitoring Systems
- Clearing Logs and Erasing Traces
- Backdoor – How to Leave an Open Entry Point
Penetration Testing – Summary
- Report Preparation and Structure
- Report Delivery and Consultation
- Verification of Recommendation Implementation
Requirements
- Familiarity with fundamental concepts related to computer networks (IP addressing, Ethernet, basic services such as DNS and DHCP) and operating systems.
- Knowledge of Windows and Linux (basic administration, system terminal).
Target Audience
- Individuals responsible for the security of networks and services.
- Network and system administrators seeking to learn security testing methodologies.
- Anyone interested in the subject.
28 Hours