Course Objectives
During this course you will learn about these topics:
Attack IoT Systems
Writing Advanced Binary Exploits
Evade Defense Mechanisms & Weaponize Exploits
Pentest Operational Technology (OT)
Accessing through Pivoting & Double Pivoting
Advanced Windows Attack
Weaponize Your Exploits
Privilege Escalation
Attack Automation with Scripts
Write Professional Reports
Bypassing a Filtered Network
Evading Defense Mechanisms
Access Hidden Networks With Pivoting
Who Should Attend?
Ethical Hackers
Penetration Testers
Network server administrators
Firewall Administrators
Security Testers
System Administrators and Risk Assessment professionals
- Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
- Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
- Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
- Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
- Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
- Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.
Agenda
1 - Introduction to Penetration Testing
- Penetration Testing Concepts
- LPT Penetration Testing Methodology
- Guidelines and Recommendations for Penetration Testing
2 - Penetration Testing Scoping and Engagement
- Request for Proposal
- Preparing Response Requirements for Proposal Submission
- Setting the Rules of Engagement
- Establishing Communication Lines
- Timeline
- Time/Location
- Frequency of meetings
- Time of Day
- Identifying Personnel for Assistance
- Handling Legal Issues in Penetration Testing Engagement
- Preparing for the Test
- Handling Scope Creeping During Pen Testing
3 - Open Source Intelligence (OSINT)
- OSINT through the WWW
- OSINT through Website Analysis
- OSINT through DNS Interrogation
- Automating the OSINT Process using Tools/Frameworks/Scripts
4 - Social Engineering Penetration Testing
- Social Engineering Penetration Testing Concepts
- Social Engineering Penetration Testing Using E-mail Attack Vector
- Social Engineering Penetration Testing Using Telephone Attack Vector
- Social Engineering Penetration Testing Using Physical Attack Vector
- Reporting and Countermeasures/Recommendations
5 - Network Penetration Testing – External
- Port Scanning
- OS and Service Fingerprinting
- Vulnerability Research
- Exploit Verification
6 - Network Penetration Testing– Internal
- Footprinting
- Network Scanning
- OS and Service Fingerprinting
- Enumeration
- Vulnerability Assessment
- Windows Exploitation
- Unix/Linux Exploitation
- Other Internal Network Exploitation Techniques
- Automating Internal Network Penetration Test Effort
- Post Exploitation
- Advanced Tips and Techniques
7 - Network Penetration Testing – Perimeter Devices
- Assessing Firewall Security Implementation
- Assessing IDS Security Implementation
- Assessing Security of Routers
- Assessing Security of Switches
8 - Web Application Penetration Testing
- Discover Web Application Default Content
- Discover Web Application Hidden Content
- Conduct Web Vulnerability Scanning
- Test for SQL Injection Vulnerabilities
- Test for XSS Vulnerabilities
- Test for Parameter Tampering
- Test for Weak Cryptography Vulnerabilities
- Tests for Security Misconfiguration Vulnerabilities
- Test for Client-Side Attack
- Tests for Broken Authentication and Authorization Vulnerabilities
- Tests for Broken Session Management Vulnerabilities
- Test for Web Services Security
- Test for Business Logic Flaws
- Test for Web Server Vulnerabilities
- Test for Thick Clients Vulnerabilities
- Wordpress Testing
9 - Wireless Penetration Testing
- Wireless Local Area Network (WLAN) Penetration Testing
- RFID Penetration Testing
- NFC Penetration Testing
10 - IoT Penetration Testing
- IoT Attacks and Threats
- IoT Penetration Testing
11 - OT/SCADA Penetration Testing
- OT/SCADA Concepts
- Modbus
- ICS and SCADA Pen Testing
12 - Cloud Penetration Testing
- Cloud Penetration Testing
- AWS Specific Penetration Testing
- Azure Specific Penetration Testing
- Google Cloud Platform Specific Penetration Testing
13 - Binary Analysis and Exploitation
- Binary Coding Concepts
- Binary Analysis Methodology
14 - Report Writing and Post Testing Actions
- Penetration Testing Report: An Overview
- Phases of Report Development
- Report Components
- Penetration Testing Report Analysis
- Penetration Testing Report Delivery
- Post-Testing Actions for Organizations