This workshop will provide you with the skills, tools and tactics needed to understand and combat cybercriminal activity. You will learn how to identify security vulnerabilities in an application by evaluating the system or network with various malicious techniques. Learn how to exploit and identify the weak points of a system through the implementation of authorized, simulated attack. You will learn how your adversary operates through both lecture and play, and you will learn how to generate, collect and evaluate the competitive intel needed for preventing and mitigating cyber-attacks.
Tools Covered: Nmap, DNSRecon, theHarvester, Metasploit, NetCat
In addition to smaller assignments, you will conduct a mini-penetration test. This will involve attacking machines in the lab and writing a penetration test report. The report must include an executive summary designed to be read by a non-technical business executive. Your instructor will be available everyday to help you in the labs. You will receive feedback on the penetration report, factoring in technical and writing skills.
- Scan a network
- Identify a vulnerable machine
- Exploit the vulnerability
- Obtain a reverse shell
- Craft a professional penetration test report
WHO SHOULD ATTEND
Anyone new to cybersecurity and in need of an introduction to the fundamentals of penetration testing. Those who want to refresh their skills or go in-depth on Red Team tactics. Professionals with computer and technical knowledge who need to be conversant in basic security concepts, principles and terms. Should be comfortable with Linux command line or have significant Windows Command Line experience. We will be working with Linux applications.
WHAT IS THE SCHEDULE
Evenings and/or weekends. Schedules vary by campus. Check your local campus schedule by clicking here and filtering for your campus.
WHAT IS THE LOCATION
HOW MANY CPE'S*
*Continuing Professional Education certificate hours.