×
CORSI ISACA
CORSI COBIT
CORSI ITIL
CORSI ISO
CORSI PRIVACY
CORSI AGILE & PM
CORSI DATA & AI
CORSI EC-COUNCIL
FORMAZIONE EC-COUNCIL AUTONOMA
CORSI COMPTIA
FORMAZIONE COMPTIA AUTONOMA
CORSI DevOps
FORMAZIONE DevOps AUTONOMA
CORSI PRATICI
CORSI MICROSOFT OFFICE
E-PRODUCTS

RISORSE GRATUITE:

FORMAZIONE AWARENESS
CONSULENZA PER LA COMPLIANCE

CSX ADVANCED EXPLOITATION COURSE

The Cybersecurity Nexus (CSX) Advanced Exploitation Course (CAEC) provides students, who possess an in-depth understanding of penetration testing, a deeper understanding of traversing complex networks. Students will work with real systems in real environments and will leverage real exploitation and pivoting tools in a live environment. Upon completion, students will understand the how to successfully exploit and move through a number of hosts on a network.
CONTENUTO:
Pivoting and Tunneling (Lesson)
In this lesson, students will:
- Learn about data redirection basics;
- Gain an understanding of different pivoting techniques;

SSH Tunneling (Lesson)
In this lesson, students will:
- Learn about SSH port forwarding;
- Pivot through an SSH tunnel;
- Exploit through an SSH tunnel;
- Pivot through multiple devices using SSH;

SSH Tunnel Implementation (Lab/Instructional)
In this lab, students will:
- Use Kali Linux to create SSH tunnels in order for a LAN machine to communicate with a DMZ server;
- Enumerate Services via an SSH tunnel;
- Exploit a device via an SSH tunnel;

Multiple SSH Tunnel Exploitation Implementation (Lab/Instructional)
In this lab, students will:
- Pivot through multiple devices using SSH tunnels;
- Enumerate services through multiple devices;
- Utilize Metasploit to exploit a remote system via multiple tunnels;
.
Metasploit PortProxy (Lesson)
In this lesson, students will:
- Learn about the PortProxy Metasploit module;
- Interact with Meterpreter;
- Pivot through Windows hosts;
- Run exploits through PortProxy;

Metasploit PortProxy Implementation (Lab/Instructional)
In this lab, students will:
- Use PortProxy to establish multiple pivot points;
- Redirect port scans to a target machine;
- Establish a backdoor on the target machine via pivot points;

Meterpreter Autoroute Implementation (Lesson)
In this lesson, students will:
- Learn about Meterpreters AutoRoute function;
- Pivot using AutoRoute;
- Run exploits through AutoRoute;

Autoroute Implementation (Lab/Instructional);
In this lab, students will:
- Use metasploit to gain perimeter access;
- Use AutoRoute to pivot through network;
- Exploit through AutoRoute;

Network Assessment (Lab/Challenge)
Based on what students have learned, thus far, they are challenged to enumerate and pivot through multiple devices and networks in order to capture a flag from the target machine.
ESAME:
The CSX Advanced Exploitation Certificate Exam assesses candidates understanding and implementation of exploiting a compromised system and gaining deeper access to a compromised network through leveraging additional exploits. The two-hour exam is a real-time, hands-on exam which challenges students to demonstrate their skill set in a live environment. This two-hour exam contains no multiple-choice questions or simulations and intentionally restricts access to the internet. Where applicable, man pages and help files are available.

Objectives:
Candidates must complete tasks of varying duration with minimal instruction while navigating between multiple virtual machines and are expected to demonstrate an ability to:
- Conduct in-depth system and network information gathering techniques;
- Identify and map networks of interest;
- Conduct Network Discovery and foot-printing techniques;
- Identify and enumerate vulnerable TCP/IP services;
- Conduct multi-level internal and external exploitations of key systems;
- Perform multi-hop exploitations;
- Exploit and subvert firewall technologies;
- Assess wireless security;

Students must be comfortable leveraging Linux terminal tools and interfaces.

LIVELLO:

ADVANCED

DOMINIO:

DETECT

PREZZO:

400,00 € + IVA

PREZZO ESAME:

250,00 € + IVA

CREDITI: 12 CPE + 4 per l'Esame, per il mantenimento delle certificazioni ISACA

RICHIESTA INFORMAZIONI

Richiedi maggiori informazioni su questo corso scrivendoci