1600
ZX305 – Network Security
Válido por 6 meses
Organizations: Contact us for enterprise solutions and volume pricing.
Network Security
Secure complex network infrastructures
Master techniques to identify weaknesses and protect organizational networks through advanced networking, Active Directory, PowerShell, and cryptography.
Series
ZX Offense
Program Code
ZX305
Level
Level-4
Organizations: Contact us for enterprise solutions and volume pricing.
Description
Learn to secure network and organizational domain infrastructures. From network protocols to domain exploitation, you'll explore potential vulnerabilities and practice countermeasures. Through hands-on practice with Windows environments, Active Directory, and PowerShell, you'll develop the skills needed to protect enterprise networks.
Most students complete this course in 10 to 12 weeks when studying regularly.
What Our Clients Say
“Over 1000 of our students have been trained using ThinkCyber's Products and Services. The hands-on experience they gain from using the Cyberium Arena Simulator and Specto is invaluable and has been instrumental in their career progression”
— John Bryce Training Center, Israel
“The training was crucial, providing my team with a wealth of knowledge through hands-on experiences. This is why, throughout June 2023, we will be welcoming SOC analysts from across the nation to participate in the CACC (CERT-IL Advanced Cyber Training). This training, facilitated by ThinkCyber and utilizing the Cyberium simulator, will provide invaluable experience and knowledge upgrades.”
— Homeland Security
“Our students are getting excellent positions such as SOC Analysts, Network Security Engineers, Forensics and Penetration Testers thanks to the applicable and relevant hands-on cybersecurity skills they've acquired through ThinkCyber's solutions.”
— James Lim, CEO of Centre for Cybersecurity Institute, Singapore
“Exceptional course! I've attended numerous programs, but this outshines them all in every conceivable way: the comprehensive content, the expert guidance, the practical exercises, and the seamless organization of the entire course.”
— Defense Forces
Program Impact & Outcomes
After completing this course, you will:
-
Understand advanced networking frameworks
-
Master Active Directory domain management
-
Use PowerShell for network administration
-
Identify and exploit domain vulnerabilities
-
Apply domain security measures
-
Implement cryptographic protections
Real-World Training Environment
From day one, you will:
-
Work with domain infrastructure
-
Practice PowerShell enumeration
-
Configure Active Directory services
-
Use tools like PSExec and Mimikatz
-
Test network security controls
-
Apply encryption techniques
What You Will Learn
In this program, learners will explore various network and organizational domain security weaknesses using diverse network hacking strategies. This exploration helps them understand potential vulnerabilities and how to counteract them.
Network Security
This module explores various attacking frameworks, providing an invaluable perspective on potential cyber threats. This knowledge helps learners to identify and address network vulnerabilities effectively.
-
Network Security Fundamentals
-
Principles of Network Security
-
Packet Tracer
-
Subnetting
-
Network Protocols
-
DHCP
-
SMB, SMB2
-
LLMNR
-
NBNS
-
Frameworks
-
Enumeration
-
Exploitation
-
Pass-The-Hash (PTH)
-
Responder
-
Collecting Information
-
Cracking Passwords
-
In this module, learners gain a comprehensive understanding of domain setup, including critical domain protocols and how they function. Moreover, it also covers domain events, providing insights into the various activities that can occur within a domain. This knowledge equips learners to manage and secure network domains effectively.
-
Domain Setup
-
Domain Installation
-
Domain Services
-
Domain Protocols
-
Kerberos
-
LDAP
-
Domain Events
-
This module focuses on the extensive capabilities of PowerShell in managing a Windows environment. It guides learners through essential PowerShell commands and illustrates methods for efficient enumeration.
-
PowerShell Commands
-
PowerShell Text Manipulation
-
PowerShell Event Logs
-
PowerShell Enumeration
-
This module begins by scanning techniques to identify vulnerabilities, followed by enumeration methods for further probing. The course then delves into exploitation techniques to leverage these vulnerabilities and finally explores post-exploitation tactics.
-
Scanning
-
Enumerating
-
Rpcclient
-
Exploitation
-
Msfconsole
-
Impacket
-
CrackMapExec
-
Post Exploitation
-
Mimikatz
-
PSexec
-
Golden Tickets
-
Domain Security
-
This module imparts knowledge of encryption techniques used in cybersecurity.
-
Encryptions
-
Classic Encryptions
-
Modern Encryptions
-