Détails
- 6 Sections
- 24 Lessons
- 42 heures
Expand all sectionsCollapse all sections
- Day 1: Introduction to Enterprise Penetration Testing4
- 1.1Overview of penetration testing methodologies
- 1.2Setting up a penetration testing environment
- 1.3Information gathering and reconnaissance
- 1.4Threat modeling and attack planning
- Day 2: Scanning and Enumeration4
- 2.5Scanning target networks using various tools
- 2.6Identifying open ports, services, and vulnerabilities
- 2.7Enumerating network resources and users
- 2.8Target selection and prioritization
- Day 3: Exploitation and Post-Exploitation4
- 3.9Password guessing and initial access
- 3.10Exploiting vulnerabilities to gain access
- 3.11Expanding access through post-exploitation techniques
- 3.12Privilege escalation on Windows and Linux systems
- Day 4: Internal Reconnaissance and Lateral Movement4
- 4.13Internal network reconnaissance
- 4.14Identifying additional targets and attack paths
- 4.15Lateral movement techniques
- 4.16Pivoting within the network
- Day 5: Advanced Attacks4
- 5.17Password cracking techniques
- 5.18Command and Control (C2) frameworks
- 5.19Attacking the Microsoft Windows domain
- 5.20Kerberos attacks (Kerberoasting, Golden Ticket, Silver Ticket)
- Day 6: Azure and Reporting4
- 6.21Azure reconnaissance and attacks
- 6.22Azure AD password spraying attacks
- 6.23Executing commands in Azure with compromised credentials
- 6.24Developing and delivering penetration test reports
Setting up a penetration testing environment
Suivant