Advanced Exploitation Security Training

by Digital Boundary Group Claim Listing

DBG's instructor-led course will teach students to recognize potential exploitation paths through a series of structured labs that simulate common attacks performed by DBG testers everyday.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Digital Boundary Group Logo

img Duration

Please Enquire

Course Details

DBG's instructor-led course will teach students to recognize potential exploitation paths through a series of structured labs that simulate common attacks performed by DBG testers everyday. These virtual environment labs provide valuable experience with typical exploitation tools used by attackers.

Through a series of step-by-step simulated attacks, the instructor provides students insight into the attack methodology, possible outcomes, and suggested mitigation steps. The knowledge that will be gained will assist Network Administrators, Security Analysts, and IT Managers to be proactive in monitoring, identifying, and mitigating malicious activity in a typical network.

Highlights:

Students will experience the following exploitation scenarios:

  • Wireless HID Device Attacks
  • Cross Site Scripting
  • Hash Cracking
  • Hash Relay Attacks
  • Session Cookie Manipulation
  • Attacking WordPress
  • MFP Printer Attacks
  • Reverse Command Shells
  • Windows Privilege Escalation
  • Configuration Vulnerabilities
  • Process Injection
  • Maintaining Persistence
  • Linux Privilege Escalation
  • FreeNAS Privilege Escalation
  • Longwoods Branch

    4226 Raney Crescent, Longwoods, London

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy