
4 Classes
Hacking / Red Team Training
Hacking / Red Team Training
Explain the importance of planning and key aspects of compliance-based assessments
Gather information to prepare for exploitation then perform a vulnerability scan and analyze results.
Exploit network, wireless, application, and RF-based vulnerabilities, summarize physical security attacks and perform post-exploitation techniques
Conduct information gathering exercises with various tools and analyze the output and basic scripts (limited to Bash, Python, Ruby, PowerShell)
Utilize report writing and handling best practices explaining recommended mitigation strategies for discovered vulnerabilities
Hacking / Red Team Training
This course covers how to communicate system to system during an assessment. One of the biggest challenges is that you found a vulnerability to exploit, but you run into a road block... The firewall is blocking incoming connections outside the vulnerable port or you don't have a static IP address. As ethical hackers and pen testers, we may be working out of a hotel room at night. How can you connect to the target systems on the inside of their network? This course explains the challenges in depth and walks through solutions to many of these common challenges.