TRS2720

Ladda ner som PDF

Professional Penetration Testing

The market's most important hacking course in performing advanced, qualitative penetration tests! For you as an IT technician or administrator, who wants learn about the most effective tools and get the right knowledge to prevent and manage data scams in your IT environment.

We will review all aspects of a penetration test, including learning about the goal, attack of external exposed services, penetration and escalation, analysis of internal IT environments for vulnerabilities, as well as how to properly document your findings and organize your work as a penetration taster.

Meet Sweden’s top penetration testers

TrueSecs experts in penetration test will share the most effective methods and experiences from the field. By the end of this five-day hacking course, you will be able to build your own toolbox and also have access to several of TrueSec’s internal tools for professional penetration tests.

Audience

Utbildningen riktar sig mot tekniker som arbetar inom organisationer med högt säkerhetsfokus och datasäkerhet såsom militären/polisen, företrädelsevis med mål att fördjupa sina säkerhetskunskaper alternativt yrkesverksamma penetrationstestare som önskar uppdatera/underhålla befintliga kunskaper inom penetrationstest och dataintrång.

Prior knowledge

Grundläggande TCP/IP
Administration av Windows samt Linux eller BSD

Courseware

A laptop with specially prepared environments to test different attack scenarios and a basic “toolbox”.

Objectives

As a participant after this hacking course, you must have operational skills in conducting qualitative penetration tests.

Details

This hacking course has a deep reality anchorage and shows how it is possible to analyze and exploit firewalls, VPN, wireless networks, applications and services based on web-based platforms as well as Unix and Window systems with advanced penetration testing.

Examples of subtraction:
– Mapping of internet presence
– Network scanning
– Automated password attacks
– Take over systems by exploiting different types of deficiencies
– Avoiding traffic and passwords on switched networks
– Extract different types of password hashes from system
– Install backdoors, trojans and rootkits
– Manage keyloggers
– Manipulate logs
– Break into Active Directory
– Advanced password scrambling
– Take advantage of pass-the-hash technology
– Perform pass-the-dutchie technician
– Attack web servers
– Attack remotely services
– Attack Wireless Infrastructures
– Exploit / Reverse Engineering
– Attack mobile devices
– Automation with PowerShell
– Capture the flag exercises
– Social Engineering / Physical Access
– Preparation of reports
– Malware & Threats
….and much more.

During this hacking course, we teach you to conduct qualitative... Läs mer

Objectives

As a participant after this hacking course, you must have operational skills in conducting qualitative penetration tests.

Details

This hacking course has a deep reality anchorage and shows how it is possible to analyze and exploit firewalls, VPN, wireless networks, applications and services based on web-based platforms as well as Unix and Window systems with advanced penetration testing.

Examples of subtraction:
– Mapping of internet presence
– Network scanning
– Automated password attacks
– Take over systems by exploiting different types of deficiencies
– Avoiding traffic and passwords on switched networks
– Extract different types of password hashes from system
– Install backdoors, trojans and rootkits
– Manage keyloggers
– Manipulate logs
– Break into Active Directory
– Advanced password scrambling
– Take advantage of pass-the-hash technology
– Perform pass-the-dutchie technician
– Attack web servers
– Attack remotely services
– Attack Wireless Infrastructures
– Exploit / Reverse Engineering
– Attack mobile devices
– Automation with PowerShell
– Capture the flag exercises
– Social Engineering / Physical Access
– Preparation of reports
– Malware & Threats
….and much more.

During this hacking course, we teach you to conduct qualitative penetration testing with effective methods along with the market’s hottest experts on advanced IT security and data fraud.

Utbildningen levereras i samarbete med

Kursfakta

Kurs-ID: TRS2720
Längd: 5 dagar
Pris exkl moms: 31 300 kr
Inregistrering: 09.00
Kursstart: 09.30
Kursslut (ca): 17.00

Frågor om kursen?

Har du frågor om kursens innehåll, leveransdatum/ort eller behöver en företagsanpassad variant? Fyll i formuläret nedan!


Avtalsrabatter och kampanjer kan ej nyttjas på denna kurs.


Ort och datum

Stockholm
4 maj-8 maj
Boka nu!

Tipsa