Get in Touch

Course Outline

How to test the security of networks and services

  • Penetration testing – what is it?
  • Penetration testing vs. audit – similarities, differences, what is appropriate?
  • Practical issues – what could go wrong?
  • Scope of tests – what do we want to check?
  • Sources of best practices and recommendations

Penetration testing – reconnaissance

  • OSINT – obtaining information from open sources.
  • Passive and active methods of network traffic analysis.
  • Identification of services and network topology.
  • Security systems (firewalls, IPS/IDS systems, WAF, etc.) and their impact on tests.

Penetration testing – vulnerability discovery

  • Identification of systems and their versions.
  • Searching for vulnerabilities in systems, infrastructure, and applications.
  • Vulnerability assessment – or "where does it hurt"?
  • Source of exploits and their customization possibilities.

Penetration testing – attack and gaining control

  • Types of attacks – how are they conducted and what are the results?
  • Attacking using remote and local exploits.
  • Attacks on network infrastructure.
  • Reverse shell – how to manage a compromised system.
  • Privilege escalation – or how to become an administrator.
  • Ready-made "hacking tools".
  • Analyzing a compromised system – interesting files, saved passwords, private data.
  • Special cases: web applications, WiFi networks.
  • Social engineering – or how to "break" a person, if the systems cannot be broken?

Penetration testing – covering tracks and maintaining access

  • Logging systems and activity monitoring.
  • Clearing logs and covering tracks.
  • Backdoor – or how to leave yourself an open entry.

Penetration testing – summary

  • Preparing the report and its structure.
  • Delivering and consulting the report.
  • Verifying the implementation of recommendations.

Requirements

  • Familiarity with basic computer networking concepts (IP addressing, Ethernet, basic services – DNS, DHCP) and operating systems.
  • Knowledge of Windows and Linux (basic administration, system terminal).

Target Audience

  • Personnel responsible for network and service security,
  • Network and system administrators wishing to learn security testing methods
  • Anyone interested in the subject.
 28 Hours

Upcoming Courses

Related Categories