The visual above shows how the courses for the pen testing & hacking track build on one another to steadily expand competence in this specialization. This link will take you to an overview of all Mile2 courses.

Short description

This course covers PowerShell based attacks giving trainees a strong skill set to help counter such attacks

Expanded description

This course is an intense few days covering the keys to hacking with PowerShell. Most companies have an Active Directory infrastructure that manages authentication and authorization to most devices and objects within the organization. Many use PowerShell to speed up and simplify management, which only makes sense. A large percentage of hacks over the last year included PowerShell based attacks. To help you counter that threat this course teaches PowerShell hacking techniques. These use nothing but what is already available to us in Windows or now in open source code on Mac and Linux.

The course is based on real world implementations of a windows infrastructure along with real world penetration testing techniques. You will leave with a real strong skill set to help test your windows environment like never before. An attendee will also walk away with a strong skill set on how to help prevent these  attacks from happening in the first place.

Contents:

  • Electronic Book(Workbook/Lab guide)
  • Exam Prep Questions
  • Exam

Prerequisites

A student needs to meet the following prequisites in order to fully benefit from the course:

  • General Understanding of Pen Testing
  • General Understanding of Active Directory
  • General Understanding of scripting and programming

Who should attend

This course was designed for the benefit of the following organization roles:

  • Penetration Testers
  • Microsoft Administrators
  • Security Administrators
  • Active Directory Administrators
  • Anyone looking to learn more about security

Course outcome

Here are just a few things you will take away from this course:

  • Detailed Lab Manual
  • VMs for performing labs on your own
  • New  ideas on testing your own AD infrastructure
  • Attacks you can use immediately
  • How to secure against PowerShell attacks

Course outline:

  • Module 0: Course Introduction
  • Module 1: Introduction to PowerShell
  • Module 2: Introduction to Active Directory and Kerberos
  • Module 3: Pen Testing Methodology Revisited
  • Module 4: Information Gathering and Enumeration
  • Module 5: Privilege Escalation
  • Module 6: Lateral Movementsand Abusing Trust
  • Module 7: Persistence and Bypassing Defenses
  • Module 8: Defending Against PowerShellAttacks

M2-CPSH

 875,00 (excl. BTW)

Uitverkocht

Offerte aanvragen