Certified Penetration Testing
Upskilling Course, 80 Academic Hours
Comprehensive Cybersecurity Training with an Offensive Security Focus
- Niveau: Fortgeschrittene
To protect computer networks and digital assets, you sometimes need to be on the offense, and try penetrating them to uncover vulnerabilities. This comprehensive cybersecurity training course focuses on various aspects of offensive security. It covers infrastructure, application, and wireless security penetration test methods and techniques that can help build a career in cybersecurity in the fields of system pentesting, infrastructure pentesting, cybersecurity, web application pentesting, and cyber operations.
By enrolling in this course, you'll explore all the avenues of penetration testing, gaining a competitive edge and developing the capabilities to perform various security assessments seamlessly.
Für wen ist dieser Kurs gedacht?
- Security analysts
- Network and security engineers
- Ethical hackers
- IT managers
- Cyber investigators
- Penetration testers
- Vulnerability assessors
Voraussetzungen
- Knowledge of TCP/IP
- Basic knowledge of Windows and Linux command lines
Lernziele
- Understanding the essentials of computer networks and architecture
- Leveraging Linux for ethical hacking practices
- Learning about privacy and anonymity
- Familiarization with Open-Source Intelligence (OSINT)
- Advanced protocol enumerations and scanning
- Identifying and assessing vulnerabilities
- Cracking passwords and secure access
- Hacking organizational systems, networks, and applications
- Evaluating post-exploitations
- Inspecting packets precisely
- Performing active sniffing attacks
Was Sie bekommen...
- Kurspräsentation als PDF-Datei
- Spickzettel und nützliche Dokumentation
- "Schweizer Taschenmesser" - 3Gb IR-Werkzeuge
- 42 hours of practical learning experience through hands-on activities
- Ein Wawiwa-Zertifikat nach erfolgreichem Abschluss des Kurses
In addition, you may choose to augment your team’s course to include preparation for relevant cybersecurity industry certification tests, at an additional cost. The cybersecurity certifications that this course can be used to prepare for include: GIAC Penetration Tester (GPEN) with CyberLive and GIAC Web Application Penetration Tester (GWAPT).
Einschlägige Cybersecurity-Zertifizierungen
Hinweis: Eine Branchenzertifizierung wird im Rahmen des Kurses weder angeboten noch garantiert.
Professioneller Betreuer und Ausbilder
Die Aufsicht über alle Wawiwa-Cyberkurse hat Nadav Nachmias, Leiter der Cybersecurity-Programme bei Wawiwa.
Die Kursleiter sind Fachleute für Cybersicherheit, die sowohl über praktische Erfahrung als auch über Schulungsfähigkeiten verfügen. Das technische Niveau des Kurses kann je nach Zielgruppe angepasst werden.
Nadav Nachmias
Leiter der Cybersecurity-Programme
Nadav ist ein Cybersecurity-Spezialist mit über 15 Jahren Erfahrung, der sich auf Cybersecurity-Strategien, -Architekturen und die Befähigung von Mitarbeitern konzentriert. Aufgrund seiner praktischen Erfahrung konnte er intuitiv verschiedene Schulungsprogramme und -materialien in verschiedenen Bereichen der Cybersicherheit entwickeln (einschließlich Cybersicherheitsmanagement, Umgang mit und Reaktion auf Vorfälle und Cyberforensik).
Was haben die Absolventen zu sagen?
Kurs-Lehrplan
Module 1: Getting Started with Fundamentals (6 Theoretical Hours, 5 Practical Hours)
- What is Information Security?
- CIA Triad
- Authentication, Authorization, and Accounting (AAA)
- Hacking Phases
- Ethical Hacking Concepts
- Understanding Common Hacking Terms
- Vulnerability Assessment
- Penetration Testing
- Concept of Red Teaming/Blue Teaming
- Information Security Controls and Policies
- OS and Network Basics
- Kali Linux
Module 2: Information Gathering Best Practices (7 Theoretical Hours, 8 Practical Hours)
- Footprinting
- Reconnaissance
- Intelligence Gathering
- Google Dorking
- Shodan
- Public Information and Information Leakage DNS
- Analysis and DNS Brute Forcing
- Discover Network Hosts
- Port Scanning
- Enumerate Listening Services
- Discover Vulnerable Attack Surfaces
Module 3: – Network and Infrastructure Penetration Testing (10 Theoretical Hours, 14 Practical Hours)
- Focused Penetration Testing
- Compromise Vulnerable Hosts
- Exploiting Missing Software Patches
- Using Metasploit to Exploit an Unpatched System
- Using the Meterpreter Shell Payload
- Generating Custom Shellcode for Exploit-DB Exploits
- Deploy Custom Executable Payloads
- Access Remote Management Interface
- DOS Attack Penetration Testing
- Sniffing and Spoofing
- Intrusion Detection System
- Firewall
- Network Device Security Audit
- Post-Exploitation and Privilege Escalation
- Harvesting Credentials from .dot Files
- Tunneling through SSH Connections
- Automating SSH Pubkey Authentication with Bash
- Scheduling a Reverse Callback Using Cron
- Escalating Privileges with SUID Binaries
- Maintaining Persistent Meterpreter Access
- Harvesting Domain-Cached Credentials
- Extracting Clear-Text Credentials from Memory
- Searching the Filesystem for Credentials in Configuration Files
- Using Pass-the-Hash to Move Laterally
Module 4: Web Application Pentesting (10 Theoretical Hours, 9 Practical Hours)
- Web Basics
- Basic Concepts of Web Applications, Working Principles
- HTML Basics
- Difference Between Static and Dynamic Websites
- Understanding HTTP Protocols
- Intro to Representational State Transfer (REST)
- HTTP Request and Response Headers
- What Is a Cookie?
- HTTP Proxy
- Server and Client Side with Example
- What Is a Session?
- Different Types of Encoding
- Web Application Penetration Testing Tools
- DirBuster
- Wfuzz
- Nikto
- wpscan
- Burp Suite
- Proxy Module
- Target and Spider Module
- Intruder Attack Types and Payload Settings
- Repeater Module
- Sequencer and Scanner Module
- Common Website Security Attacks
- Injection
- Broken Authentication and Session Management
- Cross-Site Scripting
- Insecure Direct Object Reference
- Security Misconfiguration
- Sensitive Data Exposure
- Missing Functional Level Access Controls
- Cross-Site Request Forgery
- Using Components with Known Vulnerabilities
- Unvalidated Redirects and Forwards
- XML External Entities
- A Closer Look at the 10 Ten Owasp Vulnerabilities
- Database Attacks
- SQL Injection
- Error-Based Injection
- Double Query Injection
- Boolean-Based Blind Injection
- Time-Based Blind Injection
- Dumping DB Using SQLMap
Module 5: Wireless Pentest (3 Theoretical Hours, 3 Practical Hours)
- Wireless Security Overview
- Introduction to the 802.11 Standard
- Aircrack-ng Kungfu
- EvilTwin Attack
- Wireless Security Tools
- Best Practices for Wireless and Wireless Enterprise Security
Module 6: Post-Engagement Cleanup (2 Theoretical Hours, 3 Practical Hours)
- Killing Active Shell Connections
- Removing Unnecessary User Accounts
- Deleting Miscellaneous Files
- Reversing Configuration Changes
- Closing Backdoors
Geben Sie Ihrem Team den nötigen Vorsprung, um erfolgreich zu sein - mit unseren umfassenden Kursen, die auf Ihre speziellen Bedürfnisse zugeschnitten sind.
Interessieren Sie sich für weitere Details?
Wir beantworten gerne alle Ihre Fragen!