Due to the complexity and scope of this field, the topic has been split into two courses (Penetration Testing and Advanced Penetration Testing).
This course (Advanced Penetration Testing) is the second of our two part series into penetration testing and is divided into three modules. The first module focuses primarily on the exploitation phase of a penetration test. You will be introduced to a number of tools, hackers and security professionals use to successfully exploit a target. You will learn about the heightened risk of Advanced Persistent Threats (APT’s) and understand ways in which attackers avoid detection using a command line tool known as msfvenom. At the end module 1, you will simulate a real world exploit on one of the targets in your virtualised penetration testing lab.
The second module focuses exclusively on the post-exploitation phase of a penetration test. Here you will learn the techniques used to escalate user privileges, break of out restricted shells, maintain a foothold on your target by creating backdoors, and exfiltrate data.
The final module will finalise our coursework on post-exploitation. You will learn ways in which attackers move laterally on a compromised system, and learn alternative methods they use to maintain persistence and clear any traces of their activity. The course will conclude with the most important aspect of a penetration test, but arguably the most tedious. The objective of a penetration test is to identify vulnerabilities, on a target, and convey these to clients or stakeholders in a way that they can understand and value the importance of fixing. Writing a good penetration testing report is the final deliverable, after a professional engagement. You will be briefed on the structure of a report, the features of each section and be given guidance on how to put this together in a professional and secure manner.
All the theory in this course is accompanied by hands on technical exercises so that you get a depth of learning, by doing and not just by reading.
Course Content
