Internal Network and System Security

Learning objectives

The participants know the most prevalent security issues in typical company networks. They learn about the most important IT security principles, attacker tools and methodologies and are able to gain hands-on experience and train their skills in realistic attack scenarios. The participants understand how attackers proceed, what tricks they use and which vulnerabilities are commonly exploited.  They are able to check their company independently for weak spots and can introduce and apply the corresponding countermeasures. In this course, network and system administrators learn how to protect and defend their infrastructure against realistic attacks according to current standards and best practices.

 

Highlights

  • Methodologies (Pentesting vs. Redteaming)
  • Information Gathering (Google, Website, whois, Subdomain Enumeration, Certifcate Transparency, DNS)
  • Network Tools (netcat, openssl)
  • Network Discovery with nmap (host and service discovery)
  • Network sniffing (tcpdump, Wireshark)
  • Man-in-the-middle attacks (ARP spoofing)
  • Vulnerability scanning
  • Exploitation (shells, metasploit, ExploitDB)
  • Privilege escalation in Windows and Linux (PowerSploit, Seatbelt, Lynis, LinEnum, Mimikatz)
  • Lateral movement (Pass-the-hash, responder, NTLM relay)
  • Active Directory security (Bloodhound, Pingcastle)

 

Demarcation: This course primarily treats attacks on the network and system levels. The attacks on web applications are covered in the Web Application Security courses. Analysis and monitoring of logs will be treated in the courses on forensics and APT analysis.

 

The exercises will be done on www.hacking-lab.com as well as in a local lab environment. Following the course, the Hacking-Lab environment is available to the participants for 30 days more.

 

Target group

  • Security Officers
  • Network Administrators/Engineers
  • System Administrators (Unix/Linux/Windows)
  • Firewall Administrators/Engineers
  • Active Directory Engineers

 

 Prerequisite

  • Familiarity with command lines (Windows PowerShell, Linux Bash)
  • Basic knowledge of network protocols (TCP/IP)

CALENDAR

New: Compass-Training "Internal Network and System Security" in Bern

In the 2-day seminar (in German) from February 11/12, 2020, you will get to know the most important basic concepts of IT security, attack tools and... Read more

KMU Swiss Forum 2020

The association «KMU Swiss» promotes the interaction between companies and specialists. He organises the annual KMU Swiss Forum. The next years motto... Read more

secIT 2020 – das IT Frühlings-Highlight in Hannover

Heise Medien lädt zur nächsten Veranstaltung der IT Security Branche ein. Im März 2020 öffnen die Tore der secIT zum dritten Mal. Wir sind vor Ort mit... Read more

ALL DATES

NEWS

Vulnerability in Apache Olingo OData 4.0

Compass analysts identified an XXE vulnerability in Apache Olingo OData 4.0. Read more

Vulnerability in totemodata

Fabio Poloni identified an XSS vulnerability in totemodata®. Read more

Gesundheitswesen: Ein leichtes Ziel für Hacker

«Heime & Spitäler» ist das Fachmedium für Entscheidungsträger von Schweizer Heimen und Spitäler. In der aktuellen Ausgabe beschreibt Compass Security... Read more

ARCHIVES

Compass Security Blog

Finding Active Directory attack paths using BloodHound

As a defender, you want to find and patch attack paths in your Active Directory environment. One cannot easily spot issues by looking at the Active Directory Users and Computers console, GPOs, etc.... mehr

Challenging Your Forensic Readiness with an Application-Level Ransomware Attack

Ransomware focuses on encrypting data on a filesystem-level, either locally on infected client systems or remotely on accessible file servers. However, what if ransomware would start encrypting data... mehr

ZUM BLOG