Skip to main content

Penetration Testing & Network Exploitation Labs

Code: E006 Category: Tag:

Learn the security techniques used by the Internet’s most skilled professionals. This Pentesting & Network Exploitation lab bundle, which includes 4 distinct, hands-on labs, will provide you with an introduction to all manner of reconnaissance, scanning, enumeration, exploitation and pillaging for 802.3 networks.

This lab bundle aligns with the learning objectives found in Course 537, Penetration Testing Training: Tools and Techniques.

Penetration Testing & Network Exploitation Labs Delivery Methods
6-month access to CYBRScore Penetration Testing & Network Exploitation Labs
Content aligned to Penetration Testing Training: Tools and Techniques
Penetration Testing & Network Exploitation Labs Course Benefits
Complete all manner of reconnaissance, scanning, enumeration, exploitation and pillaging for 802.3 networksSimulate an insider threat and escape restricted environments by abusing native services and functionalityHost target analysis on Linux and Windows systems
Penetration Testing & Network Exploitation Lab Content
Linux Target Analysis Labs

Introduces students to host target analysis on Linux systems. Topics include Linux command line, bash scripting and simple programming to enumerate, attack and exploit Linux hosts.

Using Linux: Students will learn a variety of Linux command line commands to navigate the system, identify users, identify network configuration, search, modify & manipulate files as well as bash scripting.
More Linux: Students will learn about the Apache web server, creating a file on the server and establishing a secure connection between 2 hosts.
IP Tables: Linux Firewall: Students will learn how to manipulate firewall rules from the command line to allow traffic to pass out of the network.
Custom Password Creation with Crunch: Students will learn how to generate password lists for use in password cracking tools.
Windows Target Analysis Labs
LAN Exploitation Labs
WAN/DMZ Exploitation & Pivoting Labs

Request Quotes

Register now

Introduction to Microsoft Excel Training

Microsoft Azure Security Technologies Training (AZ-500)

IIBA Business Analysis Body of Knowledge (BABOK) Certification Training

FPM 231 Training: Applications in Project and Program Management

Performing CyberOps Using Cisco Security Technologies (CBRCOR)

Agile Team Facilitation Training (ICP-ATF Certification)

Continuous Testing Foundation® (CTF) Certification Training

Understanding Cisco Wireless Foundations (WLFNDU)

Introduction to Kubernetes Training

Introduction to Julia Programming for Artificial Intelligence Training

arالعربية