Introduction:

The main aim of Ethical Hacking Intermediate to Advance is to assist IT experts to develop their skills and to understand how systems, networks and applications can be exploited through one of its existing vulnerabilities and how to think as an intruder or a hacker, to know the most effectiveness offensive methods and techniques. In this course we are considering hypothetical situations and case studies, performing test scenarios, at the end the IT experts can be better prepared to prevent and avoid security threats and know how to mitigate and deal with security incident after it has been occurred. Also, to better understand how to evaluate and analyze IT environment security posture.

Outlines:

Chapter 1: Active Directory Attacks

- LLMNR Poisoning.

- SMB Relay.

- Dumping Hashes with secretsdump.

- Cracking NTLM Hashes with Hashcat.

- Token Impersonation.

- Kerberoasting .

- Cracking NTDS.

- Pass The Hash (PtH).

- Golden Ticket.

- Silver Ticket.

- DCSync.

- Enumerating Active Directory.

- Create and Delete Active Directory Users.

- Directory Service Restore Mode (DSRM).

- Kerberos Brute Force.

Chapter 2: Windows Server Attacks

- Cracking Normal Service Account Password.

- Exploiting SMB Vulnerability.

- Impersonate Tokes.

- Password Spray.

Chapter 3: Post Exploitation Attacks

- Windows Pivoting.

- Linux Pivoting.

- Send Fake Emails.

Chapter 4: Malware Creation

- Create Backdoor.

- Bypass Anti-Malware.

- Use Keylogger.

- Use Macro.

- Hide Backdoor.

 

Chapter 5: Mitigation

=== Course Duration ===

  • 30 Hours (practical)

=== Training Registration ===

  • To register for this course, please fill the Registration Form or send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.