TRAINING COURSES

HOME   /   TRAINING   /   TACTICAL EXPLOITATION: WINDOWS/UNIX

Tactical Exploitation: Attacking Windows & Unix

This four-day course introduces a tactical approach that does not rely on exploiting known vulnerabilities. Using a combination of new tools and lesser-known techniques, participants will learn how hackers compromise Windows and Unix systems without depending on standard exploits. The class alternates between theory and hands-on testing, providing students with an opportunity to put their new skills to the test. Course content features the latest security practices including Windows 2016 and additional WMI-based techniques.

Classes are limited. Get registered!

Learn the following key skills:

Windows
  • Introductory Concepts and Thinking Like an Attacker
  • Host Recon
  • Privilege Escalation
  • Key Decoding
  • Persistence
  • Network Recon
  • Lateral Movement
Unix
  • Leveraging Trusts & Lateral Movement
  • Kerberos Inherent Weaknesses
  • SSH Abuse
  • LD_PRELOAD Tricks
  • PAM Trojaning
  • X11 Attacks

A windows based virtual machine is provided for each student to connect to via the Remote Desktop Protocol (RDP).

windows
  • LEVEL

Advanced

  • FORMAT

In person with Web-based option

  • DURATION

4 days, 32 hours

  • FEE

insert

  • REQUIREMENTS

Desktop computer provided

  • PREREQUISITES

See course outline for details.

Why choose the Center for Cyber Security Training

Interactive, classroom-based learning

Subject matter experts

Trusted by US government agencies

1200px-Emblem_of_the_United_States_Navy (1)
Excellent presentation, information and demonstrations! The 'war stories' and examples discussed during the class are valuable for industry leaders/managers.

- Neil S., US Navy

Classes are limited.

Enroll Now.

Want more information?

Download the Tactical Exploitation: Windows/Unix course outline now.

Related Courses

Our classroom delivers the most in-demand content from the highest profile subject matter experts. Intense and interactive, our courses prepare students with actionable insight and proven strategies.

applied-data-science-for-cyber-security

Applied Data Science for Cyber Security

This interactive course teaches security professionals how to use data science techniques to quickly manipulate and analyze network and security data and ultimately uncover valuable insights. Topics range from data preparation to machine learning and implementation.

exploit-development-bootcamp

Exploit Development Bootcamp & Advanced

Our three-day Bootcamp will teach both basic & advanced techniques from a leading exploit developer. In our Advanced course, experienced students will learn how to write exploits that bypass modern memory protections for the Win32 platform in a fast-paced, interactive learning environment.

Looking for a course that's not here? We'd love to hear your suggestions!

Are you fully prepared to deal with today's increasing cyber security risks? We can
help you get the training you need.

TRAINING INQUIRY

*We respect your privacy