Internal Network and System Security

Learning objectives

The participants know the most prevalent security issues in typical company networks. They learn about the most important IT security principles, attacker tools and methodologies and are able to gain hands-on experience and train their skills in realistic attack scenarios. The participants understand how attackers proceed, what tricks they use and which vulnerabilities are commonly exploited.  They are able to check their company independently for weak spots and can introduce and apply the corresponding countermeasures. In this course, network and system administrators learn how to protect and defend their infrastructure against realistic attacks according to current standards and best practices.

 

Highlights

  • Methodologies (Pentesting vs. Redteaming)
  • Information Gathering (Google, Website, whois, Subdomain Enumeration, Certifcate Transparency, DNS)
  • Network Tools (netcat, openssl)
  • Network Discovery with nmap (host and service discovery)
  • Network sniffing (tcpdump, Wireshark)
  • Man-in-the-middle attacks (ARP spoofing)
  • Vulnerability scanning
  • Exploitation (shells, metasploit, ExploitDB)
  • Privilege escalation in Windows and Linux (PowerSploit, Seatbelt, Lynis, LinEnum, Mimikatz)
  • Lateral movement (Pass-the-hash, responder, NTLM relay)
  • Active Directory security (Bloodhound, Pingcastle)

 

Demarcation: This course primarily treats attacks on the network and system levels. The attacks on web applications are covered in the Web Application Security courses. Analysis and monitoring of logs will be treated in the courses on forensics and APT analysis.

 

The exercises will be done on www.hacking-lab.com as well as in a local lab environment. Following the course, the Hacking-Lab environment is available to the participants for 30 days more.

 

Target group

  • Security Officers
  • Network Administrators/Engineers
  • System Administrators (Unix/Linux/Windows)
  • Firewall Administrators/Engineers
  • Active Directory Engineers

 

 Prerequisite

  • Familiarity with command lines (Windows PowerShell, Linux Bash)
  • Basic knowledge of network protocols (TCP/IP)

CALENDAR

Cyber Risks - Früherkennung leicht gemacht

Das SwissBoardForum lädt ein zum Spezialevent «Cyber Risks». Ivan Bütler zeigt in seinem Live Hacking, welchen Risiken unsere Infrastruktur gegenüber... Read more

Beer-Talk in Zürich: Bluetooth Low Energy: Protocol, Security & Attacks

Immer mehr Geräte und Gadgets können über Bluetooth Low Energy (BLE) miteinander kommunizieren. Haben Sie sich schon gefragt, was dieses BLE überhaupt... Read more

Security Training: Secure Mobile Apps

In the 2-day course (in German) from Mai 12/13, 2020, you will learn about the most important security problems of mobile apps. Read more

ALL DATES

NEWS

Vulnerability in Abacus

Ville Koch identified a Cross-Site Scripting vulnerability in Abacus. Read more

Rein kommen wir meistens

In einem Interview in der Wirtschaftszeitung «Finanz und Wirtschaft» spricht Walter Sprenger über die Motivationsgründe und Methoden der Hacker. Read more

KMU im Visier von Cyberkriminellen

In der Sendung «Fokus KMU» erzählt ein Betroffener über die Auswirkungen der Cyber Attacke auf sein Unternehmen. Cyrill Brunschwiler von Compass... Read more

ARCHIVES

Compass Security Blog

New SMBGhost Vulnerability Affects Modern Windows Systems

A new vulnerability (CVE-2020-0796) affecting SMBv3 has been discovered. The community has started to name this vulnerability SMBGhost because everyone knows this vulnerability is present but no... mehr

Domain-Join Computers the Proper Way

When you add a new computer, it must first join the domain. If you use its future main user to do it, they'll become the owner and be able to hijack the computer to become a local administrator in... mehr

ZUM BLOG