Information Technologies

360° Penetration Testing Course

hours

21

language

English

Target Audience

Network administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security, Chief Security Officers.

Topics Covered

  • Evolution of vulnerabilities
  • Persistent Threats
  • Malware evolution
  • Services Security
  • Active Directory Security
  • Permissions and Privileges
  • Password Security
  • Offline Attacks
  • Pass-The-Hash Attacks with custom CQURE Tools
  • Pass-The-Ticket Attacks
  • DPAPI Attacks with custom CQURE Tools
  • Cached Logons Attacks with custom CQURE Tools
  • Exploiting a lack of access controls
  • SQL Server Service
  • Authentication Modes
  • Stored Procedures
  • Network Scanning
  • Man-in-the-middle Attacks
  • Wireless Protocols Security
  • NetBIOS Spoofing
  • SMB Security
  • Anti-antimalware techniques
  • Non-exe Malware
  • Open Source Intelligence
  • Possible Targets
  • Building Advanced Queries
  • Cross Site Scripting
  • Injection Attacks
  • Information Leakage and Error Handling
  • Paperwork
  • Reporting
  • Responsibility
  • minimize course outline