360° Penetration Testing Course Training

  • Learn via: Classroom / Virtual Classroom / Online
  • Duration: 3 Days
  • Download PDF
  • We can host this training at your preferred location. Contact us!

The course teaches infrastructure security concepts, including the techniques on how to attack and how to respond with an appropriate countermeasure implementation. Our course has been developed around professional penetration testing and security awareness in the business and IT fields. To make sure that all participants gain the necessary infrastructure security knowledge, our classes have an intensive hands-on format.

There are no prerequisites for this course.

Network administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security, Chief Security Officers.

The course teaches infrastructure security concepts, including the techniques on how to attack and how to respond with an appropriate countermeasure implementation. Our course has been developed around professional penetration testing and security awareness in the business and IT fields.

Module 1: Evolution of Hacking

  • Evolution of vulnerabilities
  • Persistent Threats
  • Malware evolution

Module 2: Operating System Services Security Overview

  • Services Security
  • Active Directory Security

Module 3: Operating System Internal Security

  • Permissions and Privileges
  • Password Security
  • Offline Attacks
  • Pass-The-Hash Attacks with custom tools
  • Pass-The-Ticket Attacks
  • DPAPI Attacks with custom tools
  • Cached Logons Attacks with custom tools
  • Exploiting a lack of access controls

Module 4: Databases Security

  • SQL Server Service
  • Authentication Modes
  • Stored Procedures

Module 5: Reconnaissance and Target Profiling

  • Network Scanning
  • Man-in-the-middle Attacks

Module 6: Tampering with Communication (Wired and Wireless)

  • Wireless Protocols Security
  • NetBIOS Spoofing
  • SMB Security

Module 7: Malicious Files Execution

  • Anti-antimalware techniques
  • Non-exe Malware

Module 8: Google Hacking

  • Open Source Intelligence
  • Possible Targets
  • Building Advanced Queries

Module 9: HTTP Request Building

  • Cross Site Scripting
  • Injection Attacks
  • Information Leakage and Error Handling

Module 10: Legal Issues

  • Paperwork
  • Reporting
  • Responsibility


Contact us for more detail about our trainings and for all other enquiries!