Advanced Penetration Testing

The digitisation of modern life, provides accessibility and convenience never before seen in human history. However nothing good ever came without potential risks. In order to digitise products and services, tech companies need to extract and store data, similar to any other commodity on the planet. Over time these pools of data have become lakes, and in time these lakes will become oceans.  When the data is stored, handled and used in a secure and ethical manner, magic can occur. However the opposite is also true. If the data is breached, then the impact can cause significant harm and destabilise the foundations of a functional society. Penetration testing is a field which aims to maintain the magic and order in the digital systems you may take for granted.  In the field of cyber security, no target is ever 100% secure. It is only a matter of time before the wolves get in. 
· December 10, 2021
Course
Materials

Due to the complexity and scope of this field, the topic has been split into two courses (Penetration Testing and Advanced Penetration Testing). 

This course (Advanced Penetration Testing) is the second of our two part series into penetration testing and is divided into three modules. The first module focuses primarily on the exploitation phase of a penetration test. You will be introduced to a number of tools, hackers and security professionals use to successfully exploit a target. You will learn about the heightened risk of Advanced Persistent Threats (APT’s) and understand ways in which attackers avoid detection using a command line tool known as msfvenom. At the end module 1, you will simulate a real world exploit on one of the targets in your virtualised penetration testing lab. 

The second module focuses exclusively on the post-exploitation phase of a penetration test. Here you will learn the techniques used to escalate user privileges, break of out restricted shells, maintain a foothold on your target by creating backdoors, and exfiltrate data. 

The final module will finalise our coursework on post-exploitation. You will learn ways in which attackers move laterally on a compromised system, and learn alternative methods they use to maintain persistence and clear any traces of their activity. The course will conclude with the most important aspect of a penetration test, but arguably the most tedious. The objective of a penetration test is to identify vulnerabilities, on a target, and convey these to clients or stakeholders in a way that they can understand and value the importance of fixing. Writing a good penetration testing report is the final deliverable, after a professional engagement. You will be briefed on the structure of a report, the features of each section and be given guidance on how to put this together in a professional and secure manner.  

All the theory in this course is accompanied by hands on technical exercises so that you get a depth of learning, by doing and not just by reading.

Course material is only available to enrolled students.

Virtual Lab System Requirements

Although it is not a requirement to complete this course, applying the theory component of the course in our virtual labs is strongly encouraged. Most modern PC’s and Apple computers (purchased within the last 5 years) should meet the system specifications required to run the lab environment.

To participate in the virtual lab environment please ensure your computer meets our minimum system specifications:

Tablets, Mobile devices, and Netbooks are not suitable.

Operating System: Windows 10 or MacOS Sierra (or above).
Processor: Minimum AMD Ryzen 5 or Intel i5 processor or newer required.
Memory: Minimum 8GB of RAM required – 16GB RAM preferable with a 64bit dual core processor.
Storage: Minimum 50GB free disk space.

Note: Your computer must be compatible with virtualization technology.

To check if your PC has virtualization capability refer to this article HERE

To check if your MAC has virtualization capability refer to this article HERE

Linux computers will not be able to support our Virtual Lab environment.

Apply M1 computers do not currently support virtualization technology and are not suitable.  

Any computers known to have overheating issues are not permitted.

If your device does not meet our local device system requirements – please purchase our browser-based challenge labs for an alternative hands on training experience.

Course Content

Expand All
Introduction To Advanced Penetration Testing
Lesson Content
0% Complete 0/1 Steps
Lesson Content
0% Complete 0/1 Steps
Post-Exploitation
Lesson Content
0% Complete 0/1 Steps
Post-Exploitation & Report Writing
Not Enrolled

Course Includes

  • 28 Lessons
  • 21 Topics
  • 12 Quizzes
  • Course Certificate
error: