
This course has been designed for those charged with helping to secure non-western IT systems by way of penetration testing.
Course Length: 8 Hours
Includes a Certificate of Completion
Next scheduled date:
Description
This course has been designed for those charged with helping to secure non-western IT systems by way of penetration testing.
Most offensive-related cybersecurity courses today are tailored to focus on western Information Technology systems. Primarily, English-based software and systems running on-premises or hosted in cloud infrastructure, owned by western-based companies, residing within US or EU borders. This course and associated labs will cover a range of technologies, languages, software, and services that a penetration tester may encounter while engaging various theoretical non-western organizations and the different challenges each may bring. Most importantly, this course will provide you with the necessary mindset and flexible TTP’s to efficiently and effectively assess the security of any non-western IT infrastructure.
System Requirements
-
Student/Lab Requirements:
- Students need to be able to run an Ubuntu Virtual Machine and connect laptop to my wifi.
- Instructor provides an OVA / OVF to import.
Syllabus
- Introduction
- Roll call
- Workshop Overview
- Rules
- Labs
- Range overview
- How to access the range
- Operational Setup
- Attack stations
- Operating systems
- Linux
- Windows
- Operator Profiles
- Operator tools
- Operating systems
- OPSEC considerations
- Financing
- Technical
- Hostnames and usernames
- Tooling OPSEC
- LLM Usage
- Networking/Traffic obfuscation
- Attack stations
- Initial OSINT and Recon Activities
- Overview
- Scanning by Third-Party
- What can we find?
- Shodan
- ZoomEye
- Fofa
- Honeypot Identification
- SCADA Enumeration
- Remote Access Point Enumeration
- Camera and CCTV Enumeration
- SSL/TLS Enumeration
- Attack surface enumeration
- Port scanning
- Service enumeration
- Web content enumeration
- Cloud service discovery
- IP/DNS Discovery
- Certificate analysis and transparency search
- User enumeration
- Research unknown/unfamiliar technology stacks
- Detection Awareness
- Setup and tooling
- Identifying deception technologies
- Detect being detected
- Post Exploitation
- Host triage
- Cohabitation checks
- Persistence
- Network enumeration
- Data enrichment
- Lateral movement
- Data exfiltration
- Host triage
- After Action Review and Cleanup
- Desired state status (cleanup)
- Provide deliverables
- AAR
FAQ
About the Instructor
Steve Borosh
Bio
Steve Borosh is a proud U.S. Army Infantry veteran and security consultant at Black Hills Information Security. Steve has extensive experience as a penetration tester, red team operator, and instructor since 2014. Steve has instructed courses on penetration testing and red teaming for the public, private, and federal law enforcement sectors. Steve also has experience teaching and speaking at conferences such as Blackhat, various BSides events, Gartner, and others. Steve maintains a blog and GitHub repository to share knowledge and open-source offensive tools with the community. Steve earned a B.S. in Computer and Information Science from ECPI University.
Related products
-
Multiple InstructorsLive
Workshop: Getting Comfortable in Burp Suite with BB King
View Course -
Multiple InstructorsLive
Workshop: Hands on Kerberos with Tim Medin
View Course -
Multiple InstructorsLive
Workshop: AI Foundation: Cyber Security Workflow Optimization using AI Technology with Joff Thyer and Derek Banks
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLiveOD
Advanced Endpoint Investigations with Alissa Torres
View Course This product has multiple variants. The options may be chosen on the product page
