Windows Exploitation and Analysis (WEA) Training
Commitment | 5 Days, 7-8 hours a day. |
Language | English |
User Ratings | Average User Rating 4.8 See what learners said |
Price | REQUEST |
Delivery Options | Instructor-Led Onsite, Online, and Classroom Live |
COURSE OVERVIEW
This 5-day Windows Exploitation and Analysis (WEA) Training Workshop Course teaches the essentials of remote network exploitation to help students develop strategies to protect and defend their networks and critical information. Students learn how to analyze remote Windows networks, locate user credentials, and expand their access across a network.
Windows Exploitation and Analysis (WEA) Workshop Course provides an in-depth look at the essentials of remote network exploitation, from scanning and enumeration of a network space to performing client-side attacks. This Windows Exploitation and Analysis (WEA) Workshop course is for computer network professionals, software developers, and security professionals who are responsible for protecting Windows networks and data from threats.
WHAT'S INCLUDED?
- 5 days of Windows Exploitation and Analysis (WEA) Training with an expert instructor
- Windows Exploitation and Analysis (WEA) Electronic Course Guide
- Certificate of Completion
- 100% Satisfaction Guarantee
RESOURCES
- Windows Exploitation and Analysis (WEA) – https://www.wiley.com/
- Windows Exploitation and Analysis (WEA) – https://www.packtpub.com/
- Windows Exploitation and Analysis (WEA) – https://store.logicaloperations.com/
- Windows Exploitation and Analysis (WEA) – https://us.artechhouse.com/
- Windows Exploitation and Analysis (WEA) Training – https://www.amazon.com/
RELATED COURSES
- 5G Wireless Security Training
- Application Security Training
- Secure Coding in PHP Training
- Secure Coding in C/C++ Training
- Secure Coding in .NET Training
- Secure Coding in .NET: Applications Training
- Cyber Threats Detection and Mitigation Training
- Cybersecurity Investigations and Network Forensics Analysis
- Malicious Network Traffic Analysis Training
- PowerShell Automation and Windows Security Training
- Windows System Analysis Training
ADDITIONAL INFORMATION
COURSE OBJECTIVES
Upon completing this Windows Exploitation and Analysis (WEA) Training course, learners will be able to meet these objectives:
- Apply open-source tools (Metasploit and Armitage) to identify key target information
- Documenting data in a target template
- Analyze and interpret research data to determine an operational strategy
- Craft and deploy phishing emails to obtain target browser data
- Explore techniques associated with collecting data and expanding access
CUSTOMIZE IT
- We can adapt this Windows Exploitation and Analysis (WEA) Training course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Windows Exploitation and Analysis (WEA) course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Windows Exploitation and Analysis (WEA) around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Windows Exploitation and Analysis (WEA) course in a manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The target audience for this Windows Exploitation and Analysis (WEA) course:
- Novice Malware Analysts
- Incident Response Team Members
- Network Security Professionals
- Forensic Analysts
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this Windows Exploitation and Analysis (WEA) Training course are::
- Understanding of basic-to-intermediate networking concepts.
- Experience using the Windows command line.
- Basic understanding of Windows file systems.
- Experience using the Kali Linux distribution.
- Experience using the Metasploit Framework.
- Basic understanding of malicious code (malware, viruses, worms, etc.)
- Knowledge of using open-source tools and repositories to conduct research against a target network.
COURSE SYLLABUS
Windows Exploitation and Analysis (WEA) Training
1. Introduction to the Offensive Methodology and overview of documenting data in the Target Template
2. Information Gathering Website mining for key information and techniques to discover new servers through DNS brute forcing, zone transfers, etc.
3. Scanning and Enumeration Network-based scanning and enumeration using command line tools and exploits using web browser enumeration
4. Gaining Access Metasploit exploit, port redirection and tunneling techniques, client-side exploitation, and botnet deployment
5. Expanding Access Windows Registry queries, system safety, and security checks, methods for discovering files of interest, querying the Windows Active Directory, methods to crack passwords, and using pass-the-hash to access Windows systems
6. Sustaining Access Antivirus tool detection and intrusion detection systems, and techniques to sustain access