Advanced Penetration Testing, Exploit Writing, and Ethical Hacking (SEC660)

by SANS Institute Claim Listing

SEC660 is designed as a logical progression point for students who have completed SEC560: Network Penetration Testing and Ethical Hacking , or for those with existing penetration testing experience.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

SANS Institute Logo

img Duration

Please Enquire

Course Details

SEC660 is designed as a logical progression point for students who have completed SEC560: Network Penetration Testing and Ethical Hacking , or for those with existing penetration testing experience.

This course provides you with in-depth knowledge of the most prominent and powerful attack vectors and furnishes an environment to perform these attacks in numerous hands-on scenarios.

The course goes far beyond simple scanning for low-hanging fruit and teaches you how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws. 

 

  • Business Takeaways:
    • Perform penetration testing safely against network devices such as routers, switches, and NAC implementations.
    • Test cryptographic implementations.
    • Leverage an unprivileged foothold for post exploitation and escalation.
    • Fuzz network and stand-alone applications.
    • Write exploits against applications running on Linux and Windows systems.
    • Bypass exploit mitigations such as ASLR, DEP, and stack canaries.
  • You Will Be Able To
    • Perform fuzz testing to enhance your company's SDL process.
    • Exploit network devices and assess network application protocols.
    • Escape from restricted environments on Linux and Windows.
    • Test cryptographic implementations.
    • Model the techniques used by attackers to perform 0-day vulnerability discovery and exploit development.
    • Develop more accurate quantitative and qualitative risk assessments through validation.
    • Demonstrate the needs and effects of leveraging modern exploit mitigation controls.
    • Reverse-engineer vulnerable code to write custom exploits.
  • Hands-On Training
    • Exploit routing protocol implementations such as OSPF.
    • Bypass different types of NAC implementations.
    • Exploit patch updates.
    • Perform man-in-the-middle attacks to remove SSL.
    • Perform IPv6 attacks.
    • Exploit poor cryptographic implementations using CBC bit flipping attacks and hash length extension attacks.
    • Hijack network booting environments.
    • Exploit virtualization implementations.
    • Write Python scripts to automate testing.
    • Write fuzzers to trigger bugs in software.
    • Reverse-engineer applications to locate code paths and identify potential exploitable bugs.
    • Debug Linux applications.
    • Debug Windows applications.
    • Write exploits against buffer overflow vulnerabilities.
    • Bypass exploit mitigations such as ASLR, DEP, stack canaries, SafeSEH, etc.
    • Use ROP to bypass or disable security controls.
  • Central Branch

    57 Mohd Sultan Road #01-05 Sultan-Link, Central

Check out more CEH (Certified Ethical Hacker) courses in Singapore

KnowledgeTree Training Centre Logo

Certified Ethical Hacker (CEH)

The Certified Ethical Hacker course is a course that incorporates the content of EC-Council’s Certified Ethical Hacker (CEH) certification, the course also aims to prepare learners to take the CEH assessment and obtain the CEH credentials.

by KnowledgeTree Training Centre [Claim Listing ]
Koenig-Solutions Logo

Certified Ethical Hacker v12 - CEHv12

This certification validates a professional's knowledge and skills in identifying vulnerabilities and weaknesses in target systems, using the same knowledge and hacking tools as a malicious hacker but in a lawful and legitimate manner.

by Koenig-Solutions [Claim Listing ]
Avantus Training Logo

Certified Ethical Hacker (CEH v11)

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastru...

by Avantus Training [Claim Listing ]
Simpli Learn Logo

CEH v12 - Certified Ethical Hacking Course

Simplilearn’s CEH certification training course provides you the hands-on training required to master the techniques hackers leverage to penetrate network systems and fortify yours against it.

by Simpli Learn [Claim Listing ]
  • Price
  • Start Date
  • Duration
Avanta Global Logo

EC-Council Certified Ethical Hacker (CEH)

CEH is the world’s most advanced certified ethical hacking course that covers 18 of the most current security domains any individual will ever want to know when they are planning to beef up the information security posture of their organization.

by Avanta Global [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy