See how Insoft Services is responding to COVID-19

Infrastructure Hacking Check Point Certified Pen Testing Expert

X

Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

Subscribe

I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.


Upcoming Courses


Dec 7 - Dec 8, 2020
09:00 - 17:00 (CEST)
Online

Infrastructure Hacking Check Point Certified Pen Testing Expert
2 days  (Instructor Led Online)  |  Check Point Courses

Course Details

The Infrastructure Hacking Check Point Certified Pen Testing Expert course is an intermediate training designed to teach the fundamentals of what pen testing is all about. This hands-on training was written to address the market need around the world for a real hands-on, practical and hack-lab experience that focuses on what is really needed when conducting a penetration test. Whilst a variety of tools are used, they are the key tools that should be in any penetration tester’s kit bag. This, when combined with a sharp focus on methodology will give you what is necessary to start or formalise your testing career.

 

See other Check Point courses

Objectives

This curriculum familiarizes you with hacking tools and techniques.

  • Gain practical experience with tools that will serve you in the future
  • Learn tools and techniques to hack various components involved in infrastructure hacking
  • Develop a critical understanding of the concepts behind these

Outline

Day 1

  • TCP/IP basics
  • The threat of port scanning
  • Target enumeration
  • Brute-forcing
  • Meta sploit basics
  • Hacking recent Unix vulnerabilities
  • Hacking databases
  • Hacking application servers
  • Password cracking

Day 2

  • Hacking third-party applications (WordPress, Joomla, Drupal)
  • Windows enumeration
  • Hacking recent Windows vulnerabilities
  • Hacking third-party software (Browser, PDF, Java)
  • Post-exploitation: dumping secrets
  • Hacking windows domains

Target Audience

  • System administrators
  • SOC analysts
  • Penetration testers
  • Network engineers
  • Security enthusiasts
  • Anyone who wants to take their skills to the next-level

Prerequisites

Before attending the Infrastructure Hacking Check Point Certified PenTesting Expert course, you must bring or have access to a laptop with admin/root access.