Offensive CTF training is a detailed corporate-focused training that concentrates on the deep infrastructure loopholes & assessment terminologies. It focuses on infrastructure security, Internal network penetration testing, external Network Penetration testing, Web application security threats, and Overall security audit of an enterprise at its best level.
We are focusing on the overall development of a candidate, so in the initial stage of the training, we will focus on fundamental concepts of administration of Linux, customization of Linux environment as per need, detailed understanding of Windows systems.
Next stage, we focus on Core commands of shell scripting for automation, windows PowerShell core methodologies , core system commands of the Windows command-line interface, and Web application.
Finally, its time of hands-on practice, we will cover up the method of linux exploitation , windows exploitation , Active directory penetration testing and post-exploitation of various practical labs of web applications, windows, and Linux systems with industry-focused real-time use-cases.
We have also introduced stack-based buffer overflow of windows and Linux based systems as this concept is crucial as per the software security & product quality.
Offensive CTF training will help you to understand the real-time threats occurring in the organizations & also it will help a candidate to earn industries most recognized certifications like OSCP, LPT, PTX, GIAC, GPEN, Mile2, etc. These certifications will improve your KRA/KPA to get more benefits in Job.
REAL LIFE CASE STUDIES
INDUSTRY DRIVEN CERTIFICATION
STUDENT LEARNING KIT
Customize Kali Linux environment ,Linux Advanced Commands & Usages , brute forcing techniques ,Types of shells & Restricted Privileges will be explained in depth
Sudoers essentials ,SUID & SGID Detail ,Cron Jobs and tty Types ,Kernel Vulnerabilities and Patches and other Beyond Linux Insecurities with packet sniffing will be discussed in detail with practices .
Windows System Commands and usages ,Windows Firewall & Registry Insecurities and Modification ,Hot Fixes ,RDP, SMB ,WebDAV, SAM essentials ,Physical access manipulation , Hot fixes , kernel issues and Beyond Windows DLL concepts will be discussed in depth .
The most critical loopholes like SQL injections to RCE , local file and remote file inclusion issues , system commands to reverse shell , Command Injection to RCE , XML issues and other insecurities with remote code execution will be explained with hands on practice in depth .
Understanding of Shell Scripting & powershell in pentesting , Various task automation with powershell , post exploitation with powershell and usage of shell script will be discussed in depth .
In detailed concepts of enumration to post exploitation will be explained with hands on practice .
Beyond insecurities of Linux , MSSQL , MYSQL , POSTGRESQL , ORACLE & system Privilege escalation will be explained with hands on practice on various labs.
Beyond insecurities of Active Directory Exploitation and windows penetration testing , Detaild Privilege escalation will be explained with hands on practice on various labs.
Various tunnelling , portforwroding and pivoting methodlogies will be practiced on simulated labs .
This module will cover up stack based buffer overflow practices and DEP , ASLR bypasses with immunity debugger , IDA pro .
who should attend this training?
why should i take this training?
Advanced persistent threats are increasing day by day because of weak Access control policies and administration. To address all of the issues in the Internal Network of the organization we have designed this core advanced training for professionals who are skilled in Administration and Application security.
pri-requisite of the training ?
The person should have skills in basic Linux administration, Active directory services and common databases working flow.
what is the total duration of the training ?
Its an Instructor-led online training and the total duration of the training is 75 hours.