Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
How to test network and service security
- Penetration Testing – What is It?
- Penetration Testing vs. Auditing – Similarities, Differences, What is Appropriate?
- Practical problems – what could go wrong?
- Test scope – what do we want to check?
- Sources of good practices and recommendations
Penetration Test - Reconnaissance
- OSINT – or obtaining information from open sources
- Passive and active methods of network traffic analysis
- Identification of services and network topology
- Security systems (firewalls, IPS/IDS systems, WAF, etc.) and their impact on tests
Penetration Test – Searching for Vulnerabilities
- Recognition of systems and their versions
- Searching for vulnerabilities in systems, infrastructure and applications
- Vulnerability Assessment – or “Will It Hurt?”
- Exploit Sources and Customization Options
Penetration Test – Attack and Takeover
- Types of attacks – how are they carried out and what are their effects?
- Remote and local exploit attack
- Attacks on network infrastructure
- Reverse shell – how to manage a compromised system
- Privilege Escalation – or How to Become an Administrator
- Ready-made "hacking tools"
- Analysis of the compromised system – interesting files, saved passwords, private data
- Special cases: web applications, WiFi networks
- Social engineering – or how to “break” a person if you can’t break the systems?
Penetration Testing – Covering Up Traces and Maintaining Access
- Login and activity monitoring systems
- Log cleaning and trace erasure
- Backdoor – or how to leave yourself an open door
Penetration Test Summary
- Preparation of the report and its structure
- Submission and consultation of the report
- Verification of implementation of recommendations
Requirements
- Knowledge of basic issues related to computer networks (IP addressing, Ethernet, basic services - DNS, DHCP) and operating systems
- Knowledge of Windows and Linux (basic administration, system terminal)
target group
- people responsible for network and service security,
- network and system administrators who want to learn about security testing
- everyone interested in the topic.
28 Hours
Testimonials (1)
The instructor's knowledge, practical experience, variety of topics and examples of practical use of new knowledge.
Kamil - Komenda Glowna Strazy Granicznej
Course - Testy penetracyjne – wykrywanie i wykorzystywanie podatności
Machine Translated