Learn the security techniques used by the Internet’s most skilled professionals. This Pentesting & Network Exploitation lab bundle, which includes 4 distinct, hands-on labs, will provide you with an introduction to all manner of reconnaissance, scanning, enumeration, exploitation and pillaging for 802.3 networks.
This lab bundle aligns with the learning objectives found in Course 537, Penetration Testing Training: Tools and Techniques.
Penetration Testing & Network Exploitation Labs Delivery Methods
6-month access to CYBRScore Penetration Testing & Network Exploitation Labs
Content aligned to Penetration Testing Training: Tools and Techniques
Penetration Testing & Network Exploitation Labs Course Benefits
Complete all manner of reconnaissance, scanning, enumeration, exploitation and pillaging for 802.3 networksSimulate an insider threat and escape restricted environments by abusing native services and functionalityHost target analysis on Linux and Windows systems
Penetration Testing & Network Exploitation Lab Content
Linux Target Analysis Labs
Introduces students to host target analysis on Linux systems. Topics include Linux command line, bash scripting and simple programming to enumerate, attack and exploit Linux hosts.
Using Linux: Students will learn a variety of Linux command line commands to navigate the system, identify users, identify network configuration, search, modify & manipulate files as well as bash scripting.
More Linux: Students will learn about the Apache web server, creating a file on the server and establishing a secure connection between 2 hosts.
IP Tables: Linux Firewall: Students will learn how to manipulate firewall rules from the command line to allow traffic to pass out of the network.
Custom Password Creation with Crunch: Students will learn how to generate password lists for use in password cracking tools.
Windows Target Analysis Labs
LAN Exploitation Labs
WAN/DMZ Exploitation & Pivoting Labs