- Pre-configured labs with lab guides
- Gain hands-on skills in topic areas aligned to Penetration Testing Training: Tools and Techniques
Learn the security techniques used by the Internet’s most skilled professionals. This Pentesting & Network Exploitation lab bundle, which includes 4 distinct, hands-on labs, will provide you with an introduction to all manner of reconnaissance, scanning, enumeration, exploitation and pillaging for 802.3 networks.
This lab bundle aligns with the learning objectives found in Course 537, Penetration Testing Training: Tools and Techniques.
Introduces students to host target analysis on Linux systems. Topics include Linux command line, bash scripting and simple programming to enumerate, attack and exploit Linux hosts.
Introduces students to host target analysis on Windows systems. Topics include basic through intermediate Windows Command Line skills, PowerShell cmdlets and the PowerShell attack framework called PowerPreter.
Introduces student to basic scanning and exploitation of systems on internal networks that replicate a real-world penetration test. Students learn how to map, discover and exploit web applications, which requires the tester to understand how they communicate and the role the server plays in the relationship. Students learn how to conduct reconnaissance against a web server, followed by mapping its architecture and challenged with discovering vulnerabilities and misconfigurations for follow-on exploitation.
Students learn how to simulate an insider threat and escape restricted environments by abusing native services and functionality. Students then move to routed attacks against clients that have NAT devices, firewalls and DMZs deployed. They learn how to exploit a variety of web-facing services and gain access to the DMZ. Once in the DMZ they are asked to pillage the hosts and find additional information to assist in pivoting deeper into the network and into network segments that don’t touch the web directly.
Our training advisors are here for you.