Infrastructure Pentesting: Hackers Perspective or Notes from the Field
This training will teach you how real IT infrastructure attacks are performed nowadays. We will explain the tools and methods used by attackers and how social engineering is used to make employees perform activities that are dangerous to the company’s IT infrastructure. This training is based on real world scenarios.
Course Prerequisites
This advanced training, which requires a foundational understanding of Powercat and Inveigh tools. In less than three hours, this training based on real-world scenarios will equip you with the skills and know-how to conduct effective pentest and vulnerability management.
What you will learn
Topics covered:
1. Pentesting methodology
2. DNS
3. OSINT framework
4. Shellcode examples
5. Masking techniques
6. Service enumeration
7. Password attacks
8. Spoofing / MITM examples
9. Example persistency methods
What’s included
- Access to almost 3-hour recorded practical lesson including demo of real infrastructure attacks
Training materials to download. - The virtual training covers: pentesting methodology, DNS, OSINT framework, Shellcode examples, masking techniques, service enumeration, password attacks, Spoofing / MITM examples, persistency methods and more.
- 12-month access to video recording and training materials for you to keep and get back to whenever needed.
Additional information
PLEASE NOTE: It may take 2-3 business days for your course access to be activated. You will receive an email from us with all necessary details.
Only registered users can write reviews. Please Sign in or create an account