NotSoSecure - Advanced Infrastructure Hacking

Varighed

Varighed:

Kun 5 dage

Metode

Metode:

Klasseværelse / Online / Hybrid

Næste dato

Næste dato:

24/6/2024 (Mandag)

Overview

On this 5-day accelerated Advanced Infrastructure Hacking course, you'll learn adavnced penetration techniques to exploit common operating systems and networking devices.

You'll build hands-on skills, combining NotSoSecure's sophisticated hack-lab with our unique Lecture | Lab | Review technique, which immerses you in the curriculum and allows you to fully grasp the advanced hacking techniques for infrastructure systems, helping you manage the vulnerabilities of your systems.

Your expert Firebrand instructor will take you through every aspect of network hacking, from hacking domain controllers to local root, VLAN Hopping and VoIP hacking.

You'll explore a range of networking hacking tools and techniques including:

  • IPv4 and IPv6 Refresher
  • OSINT, DVCS Exploitation
  • Database Servers
  • Windows, AD and Linux exploitation techniques
  • Container breakout
  • VPN, VoLP, VLAN exploitation

On this course, you'll get 24/7 lab access and access to NotSoSecure custom built systems with specially designed hacking challenges built to stimulate creative and innovative thinking.

This course is ideal if you're a System Administrator, SOC Analyst, Penetration Tester, Network Engineer, security enthusiast or simply want to advance your knowledge in infrastructure hacking.

Curriculum

  • Module 1: IPv4/IPv6 Scanning, OSINT
    • Advanced topics in network scanning
    • Understanding & exploiting IPv6 Targets
    • Advanced OSINT Data gathering
  • Module 2: Web Technologies
    • Exploiting DVCS (git)
    • Owning Continuous Integration (CI) servers
    • Deserialization Attacks (Java, Python, Node, PHP)
    • Dishonourable Mentions (SSL/TLS, Shellshock)    
  • Module 3: Hacking Database Servers
    • Mysql
    • Postgres
    • Oracle
    • MongoDB
  • Module 4: Windows Exploitation
    • Windows Enumeration and Configuration Issues
    • Windows Desktop ‘Breakout’ and AppLocker Bypass Techniques (Win 10)
    • Local Privilege Escalation
    • A/V & AMSI Bypass techniques
    • Offensive PowerShell Tools and Techniques
    • GPO based exploit
    • Constrained and Unconstrained delegation attack
    • Post Exploitation Tips, Tools and Methodology
  • Module 5: AD Exploitation
    • Active Directory Delegation Reviews and Pwnage (Win 2012 server)
    • Pass the Hash/Ticket Pivoting and WinRM Certificates
    • Pivoting, Port Forwarding and Lateral Movement Techniques
    • Persistence and backdooring techniques (Golden Ticket, DCSync, LOLBAS)
  • Module 6: Linux Exploitation
    • Linux Vulnerabilities and Configuration Issues
    • Treasure hunting via enumeration
    • File Share/SSH Hacks
    • X11 Vulnerabilities
    • Restricted Shells Breakouts
    • Breaking Hardened Web Servers
    • Local Privilege Escalation
    • MongoDB exploitation
    • TTY hacks, Pivoting
    • Gaining root via misconfigurations
    • Kernel Exploitation
    • Post Exploitation and credentials harvesting
  • Module 7: Container Breakout
    • Breaking and Abusing Docker
    • Kubernetes Vulnerabilities
  • Module 8: VPN Exploitation
    • Exploiting Insecure VPN Configuration
  • Module 9: VoIP Attack
    • VOIP Enumeration
    • VOIP Exploitation
  • Module 10: VLAN Attacks
    • VLAN Concepts
    • VLAN Hopping Attacks
  • Module 11: Cloud Hacking
    • AWS/Azure/GCP specific attacks
    • Storage Misconfigurations
    • Credentials, API’s and token Abuse
    • IaaS, PaaS, SaaS, CaaS and Serverless exploitation
    • Azure AD attacks

What's Included

On this course, you'll get:

  • An up-to-date collection of the latest vulnerabilities.
  • Hack lab access during and for 30 days after completing the course.

Det hele er inkluderet! Du får en alt-inklusiv kursuspakke, som er målrettet til dine behov. Vi tager os af enhver detalje, så det eneste du skal fokusere på er dine lærings- og certificeringsmål.

  • Transport til/fra specifikke afhentningssteder
  • Overnatninger, samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the.
  • Intensiv Hands-on uddannelse med vores unikke (Lecture | Lab | Review)TM metode
  • Omfattende kursusmaterialer og labmanualer
  • Et helt igennem instruktørstyret program
  • 24 timers adgang til både undervisningslokale og instruktøren
  • Samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the.
  • Certificeringsgaranti

Prerequisites

Although you don't need pen testing experience, some experience in using common hacking tools such as Metasploit is recommended.

Before attending this course, you should complete the Infrastructure Hacking course, as this course builds on the principles introduced in Infrastructure Hacking.

Er du klar til dit Firebrand Kursus?

Vi interviewer alle potentielle deltagere angående deres baggrund, uddannelser, certificeringer og personlig indstilling. Hvis du kommer igennem denne screeningsprocedure, betyder det, at du har rigtig gode chancer for at bestå.

Firebrand Training tilbyder et ambitiøst uddannelsesmiljø, som forudsætter at du dedikerer dig til kurset. Ovenstående forkundskaber er vejledende; mange deltagere med mindre erfaring, men med en anden baggrund eller færdigheder, har haft succes med accelereret uddannelse hos Firebrand Training.

Hvis du funderer på hvorvidt du opfylder de anbefalede forkundskaber, er du meget velkommen til at ringe til os på 89 88 66 05 og tale med en af vores uddannelsesrådgivere, som kan hjælpe dig.

Kundereferencer

Her er Firebrand Training review afsnit. Siden 2001 har vi trænet præcist 134.561 studerende og professionelle og bedt dem alle om at gennemgå vores Accelerated Learning. Lige nu har 96,41% sagt, at Firebrand har overgået deres forventninger.

Læs anmeldelser fra de seneste accelererede kurser nedenfor, eller besøg Firebrand Stories for skriftlige og videointerviews med vores alumner.


"I had a great time. The instructor is very knowledgeable and his training is on point. Two exams in 2 days is a lot. But he makes it doable."
Juan van Gom, Ministry of Defense Netherlands. (19/1/2024 (Fredag) til 21/1/2024 (Søndag))

"Detailed and thorough training in a great environment."
Anonymous, SYP. (8/1/2024 (Mandag) til 12/1/2024 (Fredag))

"I attended the Cyber Crime Foundation course with very little knowledge.. The instructor was fantastic, explained subjects in depth and allowed a good amount of time for questions. I came away with lots of knowledge ready to use what I've learnt in my day-to-day role."
JS. (8/1/2024 (Mandag) til 12/1/2024 (Fredag))

"I very much enjoyed the training! It is a must for police officers new to Cyber Crime Units and is delivered at a good pace. Very good trainer with exceptional knowledge and enthusiasm."
Steve Lloyd, West Mercia Police. (8/1/2024 (Mandag) til 12/1/2024 (Fredag))

"I have really enjoyed the course, although I have been a self-professed nerd for many years, there was still some knowledge I took from this course. The tutorials on practical applications is something I will take away and use."
Joseph Ingram-Gettins, West Midlands Police. (8/1/2024 (Mandag) til 12/1/2024 (Fredag))

Kursusdatoer

Starter

Slutter

Tilgængelighed

Sted

Tilmelding

19/2/2024 (Mandag)

23/2/2024 (Fredag)

Afsluttet - Giv feedback

-

 

24/6/2024 (Mandag)

28/6/2024 (Fredag)

Venteliste

Landsdækkende

 

5/8/2024 (Mandag)

9/8/2024 (Fredag)

Begrænsede pladser

Landsdækkende

 

16/9/2024 (Mandag)

20/9/2024 (Fredag)

Tilgængelige pladser

Landsdækkende

 

28/10/2024 (Mandag)

1/11/2024 (Fredag)

Tilgængelige pladser

Landsdækkende

 

9/12/2024 (Mandag)

13/12/2024 (Fredag)

Tilgængelige pladser

Landsdækkende

 

Seneste anmeldelser fra vores studerende