Cyber Infrastructure & Penetration Testing

50 Hours

TDXCS-18

Course outline

This dynamic 11-module course is designed to equip professionals with a strong understanding of cybersecurity infrastructure and penetration testing techniques. Each module is tailored to nurture practical skills across various aspects of cybersecurity.

Upon Completion, Participants will Emerge with: • Mastery of advanced cybersecurity tools and techniques. • Practical knowledge in identifying and mitigating a wide range of cyber threats. • Enhanced skills in securing networks, systems, and cloud environments. • Understanding of legal and ethical considerations in cybersecurity.

Upcoming meetings

There are no upcoming meetings for this course.
Contact us to schedule this course, which will be customized specifically for your organization.
info@hackerupro.com
Download Full Syllabus

Modules

  • Penetration Testing Terminology
  • Assessment Types
  • Cyber Attack Cycle & Attack Surfaces
  • Industry Standards and Methodologies
  • Legal and Ethical Considerations
  • Search Engines and Google Hacking DB
  • Advanced Information Gathering Techniques
  • Utilizing AI Powered Reconnaissance Tools
  • Website and Network Footprinting
  • Cloud Basics
  • OWASP Top 10 for Web
  • Cross-Site Scripting -XSS
  • SQL Injection
  • Comprehensive Network Scanning
  • Domain enumeration techniques
  • Vulnerability Scanning and Analysis
  • TCP/UDP Handshakes and Advanced Scanning Techniques
  • Firewall and IDS Evasion
  • Automation in Scanning
  • Secure Password Policies and Best Practice
  • Brute Forcing and Password Spraying
  • Password Cracking
  • Known Wordlists, Rainbow Tables, and Third Party Services
  • Windows Privilege Escalation Techniques
  • On Prem and Hybrid Active Directory Enumeration
  • Kerberos Attack Techniques
  • Persisting Administrative Access in Active Directory
  • Utilizing Metasploit Framework
  • Automation in Penetration Testing
  • Creating Malicious Files
  • Fundamental Concepts of Exploitation
  • Data Exfiltration from Compromised Hosts
  • PowerShell Fundamentals
  • PowerShell ISE
  • PowerShell Modules
  • Attack with PowerShell
  • PowerShell to EXE
  • Proxy Servers, VPNs, and TOR Usage
  • Implementing Proxy Chains
  • Secure Communication Best Practices
  • Wi-Fi Encryption and Security
  • EAPOL Protocol and Attack Frameworks
  • Rogue Access Points
  • Documentation Tips
  • Report Structure
  • Findings Classification & Risk Analysis
  • ndustry Backed Remediation Recommendations

Prerequisites

  • 01 A basic understanding of computer networks and systems.
  • 02 Familiarity with Windows and Linux operating systems.

Target Audience

  • IT professionals looking to specialize in cybersecurity.
  • Network and system administrators looking to strengthen their security skills.
  • Aspiring cybersecurity experts and modern SOC Operators.
  • Security analysts and consultants seeking advanced knowledge and skills.
  • Security Integrators and Security Architects and CISOs

Contact us

    Skip to content