Proactive Network Defense

3 Days | Face to Face

Develop an understanding of the offensive mindset whilst attacking a lifelike network on our PND course.

The Internet perimeters and internal networks of organizations have become the stage of a constant arms race between diverse, ever-evolving threats, and the defenders trying to push them out. In order to win, organizations need to think with an offensive mindset and understand which tactical and strategic initiatives are most effective at beating attacks.

This course uses step-by-step tutorials and practical exercises to give participants a tangible and thorough understanding of the modern offensive mindset and its capabilities. It also equips you with the techniques that will help you defend your network against attacks of all sophistication levels, including Advanced Persistent Threats.

  • Practical, exercise-driven, and business-focused
  • Written and delivered by our consultants – experienced cyber security professionals, responsible for network penetration tests, daily
  • Focused on the offensive techniques and capabilities of modern attackers, and how to defend against them
  • Free reign to attack a realistic, simulated network, teaching you core principles that can’t be achieved with a defensive mindset alone
  • Teaches how to implement robust cyber security measures to suit your organization, way beyond the basics
Who should attend?

This is a technical course aimed mainly at those responsible for deploying and managing network infrastructure, but could be equally as helpful for individuals seeking to understand how cyber security affects their department. Prior cyber security experience isn’t needed, as we cover the basics on the way to advanced topics.

However, you should know:

  • Unix and Windows basics, such as setting an IP address, installing software, copying, moving, deleting, and reading files
  • Network fundamentals, such as the difference between TCP and UDP, the format of an IP address, and subnetting/CIDR notation
  • Common protocols such as ICMP, HTTP, DNS and SNMP
Course highlights
  • See how modern attackers bypass current perimeter security controls and break into an internal network – by doing it yourself
  • Gain full control of a fully-patched Windows 2012 domain
  • Explore the security weaknesses found in the common forms of Unix (Solaris, RedHat, Debian, etc)
  • Learn how to build and maintain a secure network that can withstand targeted attacks
Benefits to your organization

From your team to the board, everyone needs results, which is why our courses come with their own individual business case.

This 3-day Proactive Network Defense course will:

  • Help to ensure your network is resilient to attacks, against even the most advanced threats
  • Reduce the number and severity of vulnerabilities introduced into your network
  • Reduce the time and cost of remediating vulnerabilities by increasing your organization’s defensive and offensive cyber security capabilities
  • Create positive awareness of – and conventions towards – security standards and their absolute importance within the infrastructure team
Show your interest

Please enter your details below. We’ll be in touch to find out your requirements as soon as possible:

Syllabus

Foundation

  • Hackers: Culture and Motives
  • A History of Hacking
  • The Rise of Cyber Warfare
  • Advanced Persistent Threats (APTs)
  • CNE and CNA
  • War Stories
  • The CIA Triad

Perimeter Security

  • The Traditional Attack Methodology
  • Reconnaissance – Information Gathering, Google Hacking
  • Target Identification: Network Mapping, Port Scanning, Banner Grabbing
  • Vulnerability Discovery (Manual & Automated)
  • Vulnerability Scanner Limitations
  • Common Vulnerabilities
  • Configuration, Patching and Passwords
  • Hacking JBoss
  • Hacking SMTP Servers
  • Hacking Web Apps
  • SQL Injection, Code Execution
  • Network Perimeter Hardening

Windows Security

  • The Modern Attack Methodology
  • APT Mind-Set and Capabilities
  • Spear-Phishing, Drive-By Download and Watering-Hole Attacks
  • Botnets
  • Exploiting Microsoft Word and Adobe Reader
  • Bypassing Antivirus
  • Maintaining Persistence
  • Windows Privilege Escalation
  • Key Logging and Screen Capture
  • Hacking Windows Domains
  • Enumerating domains (net, powerview, bloodhound)
  • Cracking Windows Password Hashes
  • Abusing Windows Access Tokens (incognito)
  • Retrieving credentials from memory (mimikatz)
  • Cracking Windows Password Hashes
  • Buffer Overflows
  • Data Exfiltration (CNE)
  • Windows Network Hardening

Network Security

  • DNS Cache Poisoning, Spoofing and DoS
  • Sniffing / Intercepting Network Traffic
  • Man-in-the-Middle (MitM) Attacks and ARP Cache Poisoning
  • Transport Encryption Flaws
  • SSL/TLS, etc
  • Hacking Vulnerable Cisco Kit
  • Network Device Hardening

Unix Security

  • Unix File Permissions
  • Hacking Traditional Unix Services: Xserver and R* Services, etc
  • Unix Privilege Escalation
  • Cracking Unix Password Hashes

Integrating Security

  • The Death of the Perimeter
  • Defending Against Client-Side Attacks
  • Workstation Hardening
  • Compliance Auditing
  • Preventing Lateral Movement
  • Windows Domain Hardening
  • Server Hardening
  • Secure Network Design Techniques
  • Jumping Air Gaps
  • An Introduction to Intrusion Detection
  • Signature vs Anomaly Based Detection
Accreditations & Certificates

F-Secure Consulting is a value-added supplier and have a B-BBEE procurement recognition level of 100%. Learn more

Follow us
@fsecure_consult F-Secure-Consulting /fsecurelabs