Certified Powershell Hacker (CPSH) – e-learning
-
Duur
365 dagen -
Prijs
€ 1350,- -
8,9
Reviews
1000+ reviews -
Planning
-
Lesvorm
e-training
We offer you the following benefits for this Mile2 course:
- This e-learning includes an exam.
- The material is accessible 365 days after activation.
- The exam voucher is valid 365 days after activation.
This course is an intense few days covering the keys to hacking with PowerShell. We know that most companies have an Active Directory infrastructure that manages authentication and authorization to most devices and objects within the organization. Many use PowerShell to speed up and simplify management, which only makes sense. Did you know that a large percentage of hacks over the last year included PowerShell based attacks? Well they did, which is why we spend 4 days learning how to hack like the pros using nothing but what is already available to us in Windows or now in open source code on Mac and Linux!
The course is based on real world implementations of a windows infrastructure along with real world penetration testing techniques. You will leave with a real strong skill set to help test your windows environment like never before. An attendee will also walk away with a strong skill set on how to help prevent these attacks from happening in the first place!
This e-learning is in English
Doel
- Upon completion, the Certified PowerShell Hacker candidate will be able to competently take the CPSH exam.
Doelgroep
Penetration Testers
Microsoft Administrators
Security Administrators
Active Directory Administrators
Anyone looking to learn more about security
Voorkennis
General Understanding of Pen Testing
General Understanding of Active Directory
General Understanding of scripting and programming
Lucas Ditvoorst
senior accountmanagerOnderwerpen
- Module 1 – Introduction to PowerShell
- Different Tool Options
- Installing everything needed
- Language Basics
- Using the Windows API and WMI
- Interacting with the Registry
- Managing Objects and COM Objects
- Module 2 – Introduction to Active Directory and Kerberos
- Overview of Kerberos
- The three-headed monster
- Key Distribution Center
- Kerberos in Detail
- Why we care about Kerberos as a Hacker
- Overview of Active Directory
- Understanding AD concepts
- AD Objects and Attributes
- Module 3 – Pen Testing Methodology Revisited
- Introduction to the methodology
- The Plan!!
- Vulnerability Identification
- Client-side attacks with and without PowerShell
- Module 4 – Information Gathering and Enumeration
- What can a domain user see?
- Domain Enumeration
- Trust and Privileges Mapping
- After the client exploit
- Module 5 – Privilege Escalation
- Local Privilege Escalation
- Credential Replay Attacks
- Domain Privilege Escalation
- Dumping System and Domain Secrets
- PowerShell with Human Interface Devices
- Module 6 – Lateral Movements and Abusing Trust
- Kerberos attacks (Golden, Silver Tickets and more)
- Delegation Issues
- Attacks across Domain Trusts
- Abusing Forest Trusts
- Abusing SQL Server Trusts
- Pivoting to other machines
- Module 7 – Persistence and Bypassing Defenses
- Abusing Active Directory ACLs
- Maintaining Persistence
- Bypassing Defenses
- Attacking Azure Active Directory
- Module 8 – Defending Against PowerShell Attacks
- Defending an Active Directory Infrastructure
- Detecting Attacks
- Logging
- Transcripts
- Using Certificates
- Using Bastion Hosts
- Using AppLocker
Planning & Prijs
-
* *Een cursus met
start gegarandeerd.
-
*Een cursus met
valt onder de actie Summer Academy.
Cursus: Certified Powershell Hacker (CPSH) - e-learning
Vul onderstaand formulier in en je ontvangt meer informatie over de incompany- en maatwerkmogelijkheden van deze cursus.
Wil je meer informatie ontvangen, een vrijblijvende offerte ontvangen of een brochure van deze cursus downloaden? Vul onderstaande gegevens in en je ontvangt de brochure of informatie binnen één werkdag.
Gerelateerde cursussen
- De cursus Cybercrime Security Awareness
- De cursus Secure Coding Principles – OWASP Top 10
- De cursus Introductie in de Informatiebeveiliging
- De cursus CISSP Information Security
- De cursus Certified in Cybersecurity + examenvoucher
- De cursus Certified Information Security Auditor (CISA) training
- De cursus Certified Information Security Manager (CISM)
- De cursus Certified in Risk Information Systems Control (CRISC)
- De cursus Certified Penetration Testing Engineer (CPTE) – e-learning
- De cursus Certified Professional Ethical Hacker (CPEH) – e-learning
Vervolgcursussen
Ervaringen
Lucienne Groenendaal
Secretarieel medewerkster
"Training was prima, goede tips gekregen met af en toe een grap en grol. Locatie was prima, goed verzogd vwb koffie/thee, fruit en koekje. Mensen ook zeer vriendelijk. Lunch was perfect en zeer uitgebreid."
Ariana Scheepers
"De cursus was goed, en de verzorging ook!Ik heb er veel van opgestoken! De lokatie in Nieuwegein is goed te bereiken met het openbaar vervoer, dus dat is prettig. Tot een volgenden keer."
Eric Pos
Procesbeheerder bij Gemeente Amersfoort
"Ik vond de training erg leerzaam. De inhoud was van een hoog niveau en de docent was goed thuis in de materie. Ik stel het vooral op prijs dat er diep op de concepten werd ingegaan."