7Safe Certified Security Testing Associate (CSTA) – Ethical Hacking Training

7Safe Certified Security Testing Associate (CSTA) – Ethical Hacking Training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

7Safe Certified Security Testing Associate (CSTA) – Ethical Hacking Training takes delegates on a journey through the various stages of a hacking attack, or equally a penetration test, from initial information discovery and target scanning through to exploitation, privilege escalation and retaining access. In this course, practical exercises reinforce theory with each delegate having access to a Windows 2008 domain (server and workstation) along with a Linux server. Although the course demonstrates current hacking techniques, this is always done with defense in mind and countermeasures are discussed throughout.

Customize It:

• If you are familiar with some aspects of this 7Safe Certified Security Testing Associate (CSTA) – Ethical Hacking Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the 7Safe Certified Security Testing Associate (CSTA) – Ethical Hacking Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the 7Safe Certified Security Testing Associate (CSTA) – Ethical Hacking Training course in manner understandable to lay audiences.

Related Courses:

7Safe Certified Malware Investigator Training (CMI)
7Safe Certified Security Testing Professional (CSTP) – Ethical Hacking II Training

What You Will Learn:

After completing this 7Safe Certified Security Testing Associate (CSTA) – Ethical Hacking Training course, attendees will be able to:

• How to use the tools, techniques and methodologies employed by hackers, in 7Safe’s purpose-built lab environment
• How hackers collect information about an organisation prior to an attack
• Measures to secure and protect information against hacker attacks

7Safe Certified Security Testing Associate (CSTA) – Ethical Hacking Training – Course Syllabus:

Introduction

• Motivations Behind Hacking
• The Hacking Scene
• Methodology

Networking Refresher

• Sniffing Traffic

Information Discovery

• Useful Information
• Sources: websites, metadata, search engines, DNS, social engineering

Target Scanning

• Host Discovery
• Port Scanning Techniques
• Banner Grabbing

Vulnerability Assessment

• Causes of Vulnerabilities
• Classic Buffer Overflow
• Vulnerability Tracking
• Scanning
• Client-Side Vulnerabilities

Attacking Windows

• Windows Enumeration
• Metasploit
•Client-side exploits

Privilege Escalation

• Local Information Gathering
• Metasploit’s Meterperter
• Keyloggers
• Password Storage
• Password Extraction
• Password Cracking Techniques
• Cached Domain Credentials
• Windows Network
• Authentication
• Access Tokens
• Pass the Hash

Attacking Linux

• Exploitation
• Web Shells
• Pivoting the Attack
• Online Password Cracking
• ARP Poisoning Man in the Middle

Privilege Escalation Linux

• Standard Streams
• Privilege Escalation by Exploit
• Commercial Penetration
• Testing Tools
• Password Storage
• Password Cracking
• Permission Errors
• Sudo
• SUID
• Flawed Shell Scripts

Retaining Access

• Backdoors
• Trojan Horses
• Delivery Mechanisms
• Botnets
• Bypassing Client-Side Security

Covering Tracks

• Hiding Backdoors
• Simple Obfuscation
• Rootkits
• Anti-Forensics
• Log Manipulation
• Connection Laundering

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email