Advanced Exploitation Security Training

by Digital Boundary Group Claim Listing

DBG's instructor-led course will teach students to recognize potential exploitation paths through a series of structured labs that simulate common attacks performed by DBG testers everyday.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Digital Boundary Group Logo

img Duration

Please Enquire

Course Details

DBG's instructor-led course will teach students to recognize potential exploitation paths through a series of structured labs that simulate common attacks performed by DBG testers everyday. These virtual environment labs provide valuable experience with typical exploitation tools used by attackers.

Through a series of step-by-step simulated attacks, the instructor provides students insight into the attack methodology, possible outcomes, and suggested mitigation steps. The knowledge that will be gained will assist Network Administrators, Security Analysts, and IT Managers to be proactive in monitoring, identifying, and mitigating malicious activity in a typical network.

Highlights:

Students will experience the following exploitation scenarios:

  • Wireless HID Device Attacks
  • Cross Site Scripting
  • Hash Cracking
  • Hash Relay Attacks
  • Session Cookie Manipulation
  • Attacking WordPress
  • MFP Printer Attacks
  • Reverse Command Shells
  • Windows Privilege Escalation
  • Configuration Vulnerabilities
  • Process Injection
  • Maintaining Persistence
  • Linux Privilege Escalation
  • FreeNAS Privilege Escalation
  • Longwoods Branch

    4226 Raney Crescent, Longwoods, London

Check out more Network Security courses in Canada

Institute of IT Training Logo

Cybersecurity Foundation (ISO/IEC 27032)

The ISO/IEC 27032 Foundation training course presents the fundamental cybersecurity concepts and principles based on ISO/IEC 27032 and NIST cybersecurity framework.

by Institute of IT Training [Claim Listing ]
CC Cyber Security Logo

CCCS Cybersecurity Awareness and Prevention Training

The CCCS Cybersecurity Awareness and Prevention Training course teaches you specific rules on how to identify phishing emails, browsing, and mobile devices. Best practices to take control over social engineering.

by CC Cyber Security [Claim Listing ]
Calgary Board of Education Logo

Computer Networking Suite

Learn the fundamentals of networking and prepare for a career in an exciting and fast-growing field.

by Calgary Board of Education [Claim Listing ]
Chinook Learning Services Logo

Wireless Networking

Wireless networking is one of the fastest-growing segments of the computer industry. Every electronic device seems capable of wireless connections these days: computers, handhelds, cell phones, and even digital cameras are all capable of transmitting without a tether.

by Chinook Learning Services [Claim Listing ]
Vancouver Island Works Project Logo

CompTIA Security+

CompTIA Security+ is the primary course you will need to take if your job responsibilities include any security or cybersecurity role. It also provides a springboard to intermediate-level cybersecurity jobs

by Vancouver Island Works Project [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy