Internal Network and System Security

Learning objectives

The participants know the most prevalent security issues in typical company networks. They learn about the most important IT security principles, attacker tools and methodologies and are able to gain hands-on experience and train their skills in realistic attack scenarios. The participants understand how attackers proceed, what tricks they use and which vulnerabilities are commonly exploited.  They are able to check their company independently for weak spots and can introduce and apply the corresponding countermeasures. In this course, network and system administrators learn how to protect and defend their infrastructure against realistic attacks according to current standards and best practices.

 

Highlights

  • Methodologies (Pentesting vs. Redteaming)
  • Information Gathering (Google, Website, whois, Subdomain Enumeration, Certifcate Transparency, DNS)
  • Network Tools (netcat, openssl)
  • Network Discovery with nmap (host and service discovery)
  • Network sniffing (tcpdump, Wireshark)
  • Man-in-the-middle attacks (ARP spoofing)
  • Vulnerability scanning
  • Exploitation (shells, metasploit, ExploitDB)
  • Privilege escalation in Windows and Linux (PowerSploit, Seatbelt, Lynis, LinEnum, Mimikatz)
  • Lateral movement (Pass-the-hash, responder, NTLM relay)
  • Active Directory security (Bloodhound, Pingcastle)

 

Demarcation: This course primarily treats attacks on the network and system levels. The attacks on web applications are covered in the Web Application Security courses. Analysis and monitoring of logs will be treated in the courses on forensics and APT analysis.

 

The exercises will be done on www.hacking-lab.com as well as in a local lab environment. Following the course, the Hacking-Lab environment is available to the participants for 30 days more.

 

Target group

  • Security Officers
  • Network Administrators/Engineers
  • System Administrators (Unix/Linux/Windows)
  • Firewall Administrators/Engineers
  • Active Directory Engineers

 

 Prerequisite

  • Familiarity with command lines (Windows PowerShell, Linux Bash)
  • Basic knowledge of network protocols (TCP/IP)

CALENDAR

Beer-Talk in Bern: Bluetooth Low Energy: Protocol, Security & Attacks

Immer mehr Geräte und Gadgets können über Bluetooth Low Energy (BLE) miteinander kommunizieren. Haben Sie sich schon gefragt, was dieses BLE überhaupt... Read more

Compass Security an der ETH Kontaktparty

Wir nehmen teil an der schweizweit grössten akademischen IT-Recruitingmesse. Komme am Samstag, 29. Februar 2020 an die ETH Zürich und besuche uns am... Read more

Beer-Talk in St. Gallen: Bluetooth Low Energy: Protocol, Security & Attacks

Immer mehr Geräte und Gadgets können über Bluetooth Low Energy (BLE) miteinander kommunizieren. Haben Sie sich schon gefragt, was dieses BLE überhaupt... Read more

ALL DATES

NEWS

KMU im Visier von Cyberkriminellen

In der Sendung «Fokus KMU» erzählt ein Betroffener über die Auswirkungen der Cyber Attacke auf sein Unternehmen. Cyrill Brunschwiler von Compass... Read more

Daten als Wettbewerbsvorteil

Das Basel Economic Forum ist das Wirtschaftsforum für die trinationale Metropolitanregion Basel und die Nordwestschweiz. Im November fand die 6.... Read more

Vulnerability in Apache Olingo OData 4.0

Compass analysts identified an XXE vulnerability in Apache Olingo OData 4.0. Read more

ARCHIVES

Compass Security Blog

OWASP – Toronto January 2020

A write-up of the OWASP Toronto January talk which mainly focused on the correlation and integration of results generated by automated tools in application security such as SAST, DAST and SCA.... mehr

Interview with Jim McKay

“I love hacking can be used for the greater good.” During the Solothurn Film Festival 2020 we had the opportunity to meet Jim McKay, who directed, among others, two episodes for Mr. Robot season one.... mehr

ZUM BLOG