Course Overview:
This course engages students by providing in-depth knowledge of the most prominent and powerful attack vectors and an environment to perform these attacks in numerous hands-on scenarios. This course goes far beyond simple scanning for low-hanging fruit, and shows penetration testers how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws.
Attendees to TN-919:Penetration Tester course will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 5 days
Course Objectives:
- Advanced Hash Manipulation
- Command Shell vs. Terminal Access
- Enumerating Users
- Exploitation Fundamentals
- Injection Attacks
- Legal Issues
- Metasploit
- Moving Files with Exploits
- Obtaining and Passing Password Representations
- Overview of Passwords
- Penetration Testing Foundations
- Penetration Testing Process
- Penetration Testing via the Command Line
- Profiling the Target
- Reconnaissance
- Scanning for Targets
- Using a Proxy to Attack a Web Application
- Vulnerability Scanning
- Wireless Crypto and Client Attacks
- Wireless Fundamentals
Course Prerequisites:
- GSEC or equivalent experience
- UNIX, Windows, networking, and security experience
- This is a hands-on skill course requiring comfort with command line interaction and network communications
Comments
Latest comments from students
User: kdwagoner
Instructor comments: Very knowledgeable. Kept class focused and on task
Facilities comments: Good
Liked the class? Then let everyone know!
Course Overview:
This course gives students the knowledge and skills to configure Active Directory Domain Services in a distributed environment, implement Group Policies, perform backup and restore, and monitor and troubleshoot Active Directory related issues. This course includes material contained in Microsoft’s 6424, 6425, 6426 and is an aid to preparation for the 70-640 exam.
Attendees to TN-5125: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services will receive TechNow approved course materials and expert instruction.
Dates/Locations:
No Events
Duration: 5 Days
Course Objectives:
- Installation
- Administration
- Users
- Groups
- Computers
- Group Policy Infrastructure
- Group Policy Settings
- Domains and Forests
Prerequisites:
- Basic understanding of networking
- Intermediate understanding of network operating system
- An awareness of security best practices
- Basic knowledge of server hardware
- A+ or equivalent knowledge
- Some experience creating objects in Active Directory
- Basic concepts of backup and recovery in a Windows Server Environment
Comments
Latest comments from students
Liked the Class? Then let everyone know!
TechNow has been training IT, programming, and Cyber Security for over 28 years. To stay competitive and to adequately secure an enterprise, organizations need to move towards the DevOps Model. DevOps breaks down barriers between the developer and operations teams to improve collaboration and communication.
DevOps is radically changing the way organizations design, build, deploy, and operate online systems. Development and Operations teams come together to move requirements through a continuous workflow.
DevOps leaders deploy hundreds of changes every day, utilizing Continuous Integration and Continuous Delivery to leave their competitors behind. As DevOps becomes commonplace, organizations need to evolve their security practices to the DevOps Model.
Here is our list of DevOps related courses.