Infosec Advanced Ethical Hacking | Size 1.24 GB
Type Computer Science
Expert Penetration Testing Course Overview
2: ECSA, CEPT
Modern nerks and systems are fully patched, hardened from attack, and armored to the hilt with expensive security gear --- but the bad guys still get in on a daily basis! How do they do this? Why is there a news release every day of another Fortune 500 company hacked, more government secrets lost to the adversary?
InfoSec Institute’s Advanced Ethical Hacking Boot Camp aims to train you on how to successfully attack fully patched and hardened systems, how to circumvent common security controls, and how to get to confidential data. You take this knowledge back to your organization and can then formulate a way to defend against these sophisticated attacks.
In this hands-on training class, you will learn how to:
Leverage 0day (private unreleased exploits) attacks as part of the “Advanced Persistent Threat”
Run sophisticated attacks against client side applications
Use fuzzers and dynamic analysis to attack custom and COTS apps
Reverse engineer binaries to find new vulnerabilities never discovered before
Exploit secured web applications
Run chained exploits to pivot from multiple exploitable systems
Attack and defeat VPNs, IDS/IPS and other security technologies
All of this against fully patched, fully hardened systems.
You will learn how to chain a few commonly ignored low severity vulnerabilities into a highly critical remote exploit. Once your attacks are successful, you will practice data capture. Then, learn how to intercept and replay confidential data, for example, learn how to VoIP nerk traffic and data mine it for authentication information.
Every evening you will put everything you learned during the day together in an all-encompassing Capture the Flag (CTF) exercise. This enables you to test that you really understand how to use what you have learned in a real world situation, with an expert instructor by your side to assist your efforts.
The goal of this course is to help you master a more efficient and effective penetration testing process. By learning how to fully utilize 0day attacks that replicate an APT attack, you become a very valuable member of any penetration testing team. This course also supports and prepares you for the CEPT and ECSA certification exams.
HANDS-ON LABS WITH IN-CLASSROOM EQUIPMENT:
Hundreds of exercises in over 31 separate Hands-On Labs bring up to speed with the latest threats your organization is most vulnerable to. Practice penetration testing on our virtualized environment that simulates a full range of servers and services used in a real company. Learn how to compromise web servers, virtual machines, databases, routers, firewalls, and then put it all together in an unscripted evening CTF (Capture The Flag)
I recommends Buy premimum account for High speed+ parallel downloads!
Only the registered members can see the download links/content. please Register to gain full access.