Internal Network and System Security

Learning objectives

The participants know the most prevalent security issues in typical company networks. They learn about the most important IT security principles, attacker tools and methodologies and are able to gain hands-on experience and train their skills in realistic attack scenarios. The participants understand how attackers proceed, what tricks they use and which vulnerabilities are commonly exploited.  They are able to check their company independently for weak spots and can introduce and apply the corresponding countermeasures. In this course, network and system administrators learn how to protect and defend their infrastructure against realistic attacks according to current standards and best practices.

 

Highlights

  • Methodologies (Pentesting vs. Redteaming)
  • Information Gathering (Google, Website, whois, Subdomain Enumeration, Certifcate Transparency, DNS)
  • Network Tools (netcat, openssl)
  • Network Discovery with nmap (host and service discovery)
  • Network sniffing (tcpdump, Wireshark)
  • Man-in-the-middle attacks (ARP spoofing)
  • Vulnerability scanning
  • Exploitation (shells, metasploit, ExploitDB)
  • Privilege escalation in Windows and Linux (PowerSploit, Seatbelt, Lynis, LinEnum, Mimikatz)
  • Lateral movement (Pass-the-hash, responder, NTLM relay)
  • Active Directory security (Bloodhound, Pingcastle)

 

Demarcation: This course primarily treats attacks on the network and system levels. The attacks on web applications are covered in the Web Application Security courses. Analysis and monitoring of logs will be treated in the courses on forensics and APT analysis.

 

The exercises will be done on www.hacking-lab.com as well as in a local lab environment. Following the course, the Hacking-Lab environment is available to the participants for 30 days more.

 

Target group

  • Security Officers
  • Network Administrators/Engineers
  • System Administrators (Unix/Linux/Windows)
  • Firewall Administrators/Engineers
  • Active Directory Engineers

 

 Prerequisite

  • Familiarity with command lines (Windows PowerShell, Linux Bash)
  • Basic knowledge of network protocols (TCP/IP)

CALENDAR

Connecta 2019 - Digitalization takes center stage

Digitalization and its effects on society and business are the focus of this year's Connecta. Read more

Compass-Training "Secure Mobile Apps" in Zurich

In the 2-day course (in German) from November 5/6, 2019, you will learn about the most important security problems of mobile apps. Read more

BlackAlps 2019

The event features cyber security experts from Switzerland and abroad. Besides tech talks there are also workshops such as the hands-on security lab... Read more

ALL DATES

NEWS

Gesundheitswesen: Ein leichtes Ziel für Hacker

«Heime & Spitäler» ist das Fachmedium für Entscheidungsträger von Schweizer Heimen und Spitäler. In der aktuellen Ausgabe beschreibt Compass Security... Read more

Vulnerablitity in VeloCloud™

Silas Bärtsch identified a vulnerability in VeloCloud™ (VMware), that allows a VeloCloud standard admin user to access user information of other... Read more

Danke für Ihren Besuch auf der it-sa

Die it-sa 2019 liegt bereits hinter uns. Wir blicken zurück auf drei intensive Tage in Nürnberg, mit vielen tollen Gesprächen und interessanten... Read more

ARCHIVES

Compass Security Blog

There is such thing as a free lunch

Usually you need to pay for lunches with cash or using your credit card. But in some places employees can pay for a lunch using their access badge. And this is the payment method that will be covered... mehr

A Smart Card Odyssey

Black box analysis of a not so smart card in ID-1 form factor that is in use for the billing of washing machines and tumble driers. mehr

ZUM BLOG