Course Outline

How to test network and service security

  • Penetration Testing – What is It?
  • Penetration Testing vs. Auditing – Similarities, Differences, What is Appropriate?
  • Practical problems – what could go wrong?
  • Test scope – what do we want to check?
  • Sources of good practices and recommendations

Penetration Test - Reconnaissance

  • OSINT – or obtaining information from open sources
  • Passive and active methods of network traffic analysis
  • Identification of services and network topology
  • Security systems (firewalls, IPS/IDS systems, WAF, etc.) and their impact on tests

Penetration Test – Searching for Vulnerabilities

  • Recognition of systems and their versions
  • Searching for vulnerabilities in systems, infrastructure and applications
  • Vulnerability Assessment – or “Will It Hurt?”
  • Exploit Sources and Customization Options

Penetration Test – Attack and Takeover

  • Types of attacks – how are they carried out and what are their effects?
  • Remote and local exploit attack
  • Attacks on network infrastructure
  • Reverse shell – how to manage a compromised system
  • Privilege Escalation – or How to Become an Administrator
  • Ready-made "hacking tools"
  • Analysis of the compromised system – interesting files, saved passwords, private data
  • Special cases: web applications, WiFi networks
  • Social engineering – or how to “break” a person if you can’t break the systems?

Penetration Testing – Covering Up Traces and Maintaining Access

  • Login and activity monitoring systems
  • Log cleaning and trace erasure
  • Backdoor – or how to leave yourself an open door

Penetration Test Summary

  • Preparation of the report and its structure
  • Submission and consultation of the report
  • Verification of implementation of recommendations

Requirements

  • Knowledge of basic issues related to computer networks (IP addressing, Ethernet, basic services - DNS, DHCP) and operating systems
  • Knowledge of Windows and Linux (basic administration, system terminal)

target group

  • people responsible for network and service security,
  • network and system administrators who want to learn about security testing
  • everyone interested in the topic.
 28 Hours

Number of participants


Price Per Participant (Exc. Tax)

Testimonials (1)

Provisional Courses

Related Categories