Students will learn in a hands-on environment that resembles a real-world network, which includes Active Directory and common server and workstation configurations.
Students will learn in a hands-on environment that resembles a real-world network, which includes Active Directory and common server and workstation configurations. Students will start by learning common exploitation techniques using Kali Linux and common administration tools, followed by implementing effective countermeasures to defend against these common attacks, tools, and techniques.
Upon completion of the course, students will be able to apply operating system and Active Directory hardening techniques, mitigate legacy software risks, and design tolerant networks that are resistant to present and future threats.
Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.
We offer information security consulting, penetration testing, application security testing (web and mobile), wireless security assessments, SCADA/ICS security assessments, and physical social engineering assessments.
DBG’s penetration test methodology is based on a number of industry standards and best practices including OWASP Application Security Verification Standard, ISO 27000 series.
NIST, OSSTMM, and PCI DSS. In addition to our penetration tests and assessments, we offer hands-on network security and hardening windows networks courses.
© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy