For direct assistance contact us! +91-9999508202 [email protected]

Infrastructure Pentesting and defences

The Advanced Infrastructure pentesting and defences training covers all aspects of internal and external network security assessments together .

Network security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure.

The main goal of network security is to protect the integrity, confidentiality and accessibility of internal and external networks of an enterprise, including the servers, systems, wireless, firewalls, VPN, VLAN networks. It targets a wide range of threats and then prevents them from spreading or entering the network.

Thereby, creating a secure and safe platform for people, processes and technology join our offensive network exploitation and defenses for beyond practical exploitation and countermeasures.

In the infrastructure pentesting and defenses training we will intensively focus on internal network penetration testing, external penetration testing, infrastructure penetration testing, Active directory exploitation & post exploitation will be covered with real life case studies.

The Network Configuration Review and Baseline security makes this training at next level with checklist preparation and enterprise report writing.

 

offensive Network Pentesting and Defenses 1

REAL LIFE CASE STUDIES

INSTRUCTOR-LED SESSIONS

INDUSTRY DRIVEN CERTIFICATION

DAILY ASSIGNMENTS

STUDENT LEARNING KIT

 

syllabus

syllabus

offensive Network Pentesting and Defenses 2
module 1 : CORE NETWORK ADMINISTRATION
  • Understanding of network with Layered approach , TCP/IP protocol stack , Common Protocols, ICMP , IPV4 , IPV6 , VPN ,VLAN .
  • Detailed Sub-netting & Super-netting, Analysis of packets with wireshark
  • Windows Server Administration & Actice Directory Implementation
  • Linux commands -101
  • Powershell core command Fundamentals.
offensive Network Pentesting and Defenses 3
module 2 : OSINT techniques and SOP
  • Understaing Social Security of an organisation
  • OSINT for Social Security and Threat mapping
  • MITRE  and Other Pentesting frameworks
  • Scope analysis and NDA documentation .

 

offensive Network Pentesting and Defenses 4
module 3 : enumration & scanning Primer
  • Corporate Vulnerability assessments tools
    • Nessus  primer
    • Nexpose  primer
    • Openvas primer
    • Nmap primer
    • Custom scanning primer
  • Mapping the network scope for assessment
  • System Enumeration in depth with various protocols  .
  • VA Reporting and Critical Patching
offensive Network Pentesting and Defenses 4
module 3 : brute force , load testing and hash cracking
    • Understanding the Linux and Windows auth procedure .
    • Understanding the active directory authentication procedure
    • Brute forcing techniques with various tools like hydra , patator etc .
    • Cracking hash with John the Ripper , Hashcat .
    • Conducting Layer 3 and 7 DOS attacks for stress testing. 
    offensive Network Pentesting and Defenses 6
    module 4 : Internal network pentesting
    • Mapping of internal network and analysis of internal network services
    • firewall scoping and packet evasion
    • VPN and VLAN pentesting
    • internal wireless network exploitation
    • database servers, container services & printing services exploitation
    • C2 frameworks for automating the attacks and professional assessments .

     

    offensive Network Pentesting and Defenses 7
    module 5 : External network pentesting
    • Mapping external IP ranges according to the scope
    • finding remote services and DMZ mapping
    • Default passwords , Brute force on the common services
    • Kiosk services exploitation
    • pivoting and tunnelling the internal services 
    • Linux and Windows Servers exploitation
    • Post exploitation and data exfiltration

     

    offensive Network Pentesting and Defenses 7
    module 6 : Active directory penetsting
    • Mapping AD policies and stranded corporate procedures
    • common administrators mistakes & implementation issues
    • Kerberosting techniques
    •  PowerShell remoting  and WMI attacks
    •  Sql server hunting 
    • Lateral movements in active directory
    •  A red teamers approach to perform lateral movement techniques .

     

    offensive Network Pentesting and Defenses 7
    module 7 : network audit & baseline security

     the baseline security and industrial Auditing of Firewalls ,Switches , VPN , VLAN , Windows OS , Linux OS , Servers , Web Servers Databases Routers  and baseline security of various systems will be covered in this module .

     

    File Data theft
    module 8 : report writing

    Standerd Corporate Internal network , External network , Network Audit , Baseline Security reporting will be covered in this module .

     

    who should attend this training?
    • Freshers

    • Ethical hackers

    • System Administrators

    • Network Administrators

    • Engineers

    • Web admins

    • Auditors

    • Security Professionals

    why should i take this training?

    This is an expert level training that helps you to take your skills at the next level with pentesting the Active directory networks, Internal networks and External network of an organization. You will also learn Professional Audit of Firewalls, Routers, Switches and Other Resources.

    prerequisite of the training ?

    The person should familiar with basic computer operations 

    what is the total duration of the training ?

    Its an Instructor-led online training and the total duration of the training is 50 hours.

    infrastrcuture pentesting and defenses  training enquiry

    12 + 14 =

    Our clients

    Testimonials

    Today I’ve completed my one 2 one online training by Mr Naresh sir from Certcube Labs .
    This is the first time I have attended a class in this format and wondered how effective it would be. It was very effective and therefore I would definitely be interested in attending other classes in the same format. The instructor was very knowlegeable and provided a wealth of information about the current version, especially since the last version I used was several releases ago.
    Satyam Singh

    BCA, Delhi University

    A good place to learn every small detail in cybersecurity.Really nice and helpful teacher.

    subhum

    Btech, BITS Mesra

    together Let’s Create the future

    9 + 7 =