Tactical Exploitation: Attacking Windows & Unix
This four-day course introduces a tactical approach that does not rely on exploiting known vulnerabilities. Using a combination of new tools and lesser-known techniques, participants will learn how hackers compromise Windows and Unix systems without depending on standard exploits. The class alternates between theory and hands-on testing, providing students with an opportunity to put their new skills to the test. Course content features the latest security practices including Windows 2016 and additional WMI-based techniques.
Classes are limited. Get registered!
Learn the following key skills:
A windows based virtual machine is provided for each student to connect to via the Remote Desktop Protocol (RDP).
4 days, 32 hours
Penetration Testers, Detection and Response Staff, System Administrators and Developers
See course outline for details.
Why choose the Center for Cyber Security Training
Interactive, classroom-based learning
Subject matter experts
Trusted by US government agencies
Excellent presentation, information and demonstrations! The 'war stories' and examples discussed during the class are valuable for industry leaders/managers.
- Neil S., US Navy
Classes are limited.
Want more information?
Download the Tactical Exploitation: Windows/Unix course outline now.
Our classroom delivers the most in-demand content from the highest profile subject matter experts. Intense and interactive, our courses prepare students with actionable insight and proven strategies.
Applied Data Science for Cyber Security
This interactive course teaches security professionals how to use data science techniques to quickly manipulate and analyze network and security data and ultimately uncover valuable insights. Topics range from data preparation to machine learning and implementation.
Exploit Development Bootcamp & Advanced
Our three-day Bootcamp will teach both basic & advanced techniques from a leading exploit developer. In our Advanced course, experienced students will learn how to write exploits that bypass modern memory protections for the Win32 platform in a fast-paced, interactive learning environment.