Course Details
The Infrastructure Hacking Check Point Certified Pen Testing Expert course is an intermediate training designed to teach the fundamentals of what pen testing is all about. This hands-on training was written to address the market need around the world for a real hands-on, practical and hack-lab experience that focuses on what is really needed when conducting a penetration test. Whilst a variety of tools are used, they are the key tools that should be in any penetration tester’s kit bag. This, when combined with a sharp focus on methodology will give you what is necessary to start or formalise your testing career.
Objectives
This curriculum familiarizes you with hacking tools and techniques.
- Gain practical experience with tools that will serve you in the future
- Learn tools and techniques to hack various components involved in infrastructure hacking
- Develop a critical understanding of the concepts behind these
Outline
Day 1
- TCP/IP basics
- The threat of port scanning
- Target enumeration
- Brute-forcing
- Meta sploit basics
- Hacking recent Unix vulnerabilities
- Hacking databases
- Hacking application servers
- Password cracking
Day 2
- Hacking third-party applications (WordPress, Joomla, Drupal)
- Windows enumeration
- Hacking recent Windows vulnerabilities
- Hacking third-party software (Browser, PDF, Java)
- Post-exploitation: dumping secrets
- Hacking windows domains
Target Audience
- System administrators
- SOC analysts
- Penetration testers
- Network engineers
- Security enthusiasts
- Anyone who wants to take their skills to the next-level
Prerequisites
Before attending the Infrastructure Hacking Check Point Certified PenTesting Expert course, you must bring or have access to a laptop with admin/root access.