Get in Touch

Course Outline

How to test network and service security

  • Penetration testing – what is it?
  • Penetration test versus audit – similarities, differences, and best approaches.
  • Practical challenges – what can go wrong?
  • Scope of testing – what exactly are we checking?
  • Sources of best practices and recommendations.

Penetration testing – reconnaissance

  • OSINT – acquiring information from public sources.
  • Passive and active network traffic analysis methods.
  • Identification of services and network topology.
  • Security systems (firewalls, IPS/IDS systems, WAFs, etc.) and their impact on testing.

Penetration testing – vulnerability discovery

  • Identifying systems and their versions.
  • Discovering vulnerabilities in systems, infrastructure, and applications.
  • Assessing vulnerabilities – what matters most?
  • Exploit sources and their customization possibilities.

Penetration testing – attack and takeover

  • Types of attacks – how they are conducted and their consequences.
  • Attacks using remote and local exploits.
  • Attacks on network infrastructure.
  • Reverse shell – managing a compromised system.
  • Privilege escalation – how to become an administrator.
  • Common "hacking tools".
  • Analysing a compromised system – interesting files, saved passwords, and private data.
  • Special cases: web applications and WiFi networks.
  • Social engineering – how to "break" a human when systems cannot be breached.

Penetration testing – covering tracks and maintaining access

  • Logging and activity monitoring systems.
  • Cleaning logs and covering tracks.
  • Backdoors – how to leave persistent access.

Penetration testing – summary

  • Report preparation and structure.
  • Report delivery and consultation.
  • Verification of recommendation implementation.

Requirements

  • Knowledge of basic computer networking concepts (IP addressing, Ethernet, core services such as DNS and DHCP) and operating systems.
  • Knowledge of Windows and Linux (basic administration, command-line terminal).

Target Audience

  • Individuals responsible for network and service security,
  • Network and system administrators seeking to learn security testing methods,
  • Anyone interested in the topic.
 28 Hours

Custom Corporate Training

Training solutions designed exclusively for businesses.

  • Customized Content: We adapt the syllabus and practical exercises to the real goals and needs of your project.
  • Flexible Schedule: Dates and times adapted to your team's agenda.
  • Format: Online (live), In-company (at your offices), or Hybrid.
Investment

Price per private group, online live training, starting from 5200 € + VAT*

Contact us for an exact quote and to hear our latest promotions

Provisional Upcoming Courses (Contact Us For More Information)

Related Categories