Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
How to test network and service security
- Penetration testing – what is it?
- Penetration test versus audit – similarities, differences, and best approaches.
- Practical challenges – what can go wrong?
- Scope of testing – what exactly are we checking?
- Sources of best practices and recommendations.
Penetration testing – reconnaissance
- OSINT – acquiring information from public sources.
- Passive and active network traffic analysis methods.
- Identification of services and network topology.
- Security systems (firewalls, IPS/IDS systems, WAFs, etc.) and their impact on testing.
Penetration testing – vulnerability discovery
- Identifying systems and their versions.
- Discovering vulnerabilities in systems, infrastructure, and applications.
- Assessing vulnerabilities – what matters most?
- Exploit sources and their customization possibilities.
Penetration testing – attack and takeover
- Types of attacks – how they are conducted and their consequences.
- Attacks using remote and local exploits.
- Attacks on network infrastructure.
- Reverse shell – managing a compromised system.
- Privilege escalation – how to become an administrator.
- Common "hacking tools".
- Analysing a compromised system – interesting files, saved passwords, and private data.
- Special cases: web applications and WiFi networks.
- Social engineering – how to "break" a human when systems cannot be breached.
Penetration testing – covering tracks and maintaining access
- Logging and activity monitoring systems.
- Cleaning logs and covering tracks.
- Backdoors – how to leave persistent access.
Penetration testing – summary
- Report preparation and structure.
- Report delivery and consultation.
- Verification of recommendation implementation.
Requirements
- Knowledge of basic computer networking concepts (IP addressing, Ethernet, core services such as DNS and DHCP) and operating systems.
- Knowledge of Windows and Linux (basic administration, command-line terminal).
Target Audience
- Individuals responsible for network and service security,
- Network and system administrators seeking to learn security testing methods,
- Anyone interested in the topic.
28 Hours
Custom Corporate Training
Training solutions designed exclusively for businesses.
- Customized Content: We adapt the syllabus and practical exercises to the real goals and needs of your project.
- Flexible Schedule: Dates and times adapted to your team's agenda.
- Format: Online (live), In-company (at your offices), or Hybrid.
Price per private group, online live training, starting from 5200 € + VAT*
Contact us for an exact quote and to hear our latest promotions