Cybersecurity Training

Building and Breaking: Networks

Our “Building and Breaking” series is ideal for those looking to build more secure networks and harden their servers against attacks. This course aims to give the “Attacker Perspective” to IT Teams to enable them to better understand how these attacks take place, and therefore better secure their systems against potential attacks.

Course Overview

In today’s digital landscape, robust network and server security Is essential for all organisations. This hands-on course Is designed for IT teams ready to elevate their cybersecurity skills and proactively defend against real-world threats.

This course covers the methodology for performing effective security testing, an overview of common vulnerabilities and defensive mechanisms, and hands-on labs to let you test your understanding and experiment with common real-world vulnerabilities.

This course covers the methodology for performing effective security testing, an overview of common vulnerabilities and defensive mechanisms, and hands-on labs to let you test your understanding and experiment with common real-world vulnerabilities.

The Methodology

You wont just learn about vulnerabilities in isolation. We will also discuss how vulnerabilities may be chained together to form an attack and how hardening and remediation activities can effectively prevent an attacker making progress. 

There’s more to effective defense and secure system development than just knowing about vulnerabilities and their exploitation – we also cover the stages of an effective security test to ensure that your approach achieves good coverage.

Course Overview

Our course starts with a quick refresher of cybersecurity fundamentals and then builds on those fundamentals to ensure teams have all aspects covered. The course includes:

  • Hacker Motivations
  • Network Security Fundamentals
  • Common Server Weaknesses
  • Detecting Common Attack Tools
  • Windows OS Hardening
  • Active Directory Hardening

Hands-on Labs

Our bespoke hands-on labs are based on a realistic virtualised network, allowing you to safely test the skills you’ve gained during the day to ensure you’ve understood the fundamentals and can apply them to an example system:

  • Network Mapping
  • Vulnerability Discovery
  • User Account Compromise
  • Local Privilege Escalation
  • Domain Privilege Escalation
  • Network Propagation
  • Gaining Persistence

Remediation

Whilst it’s often the least talked about part of security testing – remediation is of course the most important. It doesn’t matter how many vulnerabilities you find if you can’t quickly and effectively explain to the team how they can fix them. For each vulnerability discussed we will discuss a specific remediation, as well as giving examples of hardening options throughout to make devices more resilient to attacks in general.

This course is ideal for IT professionals looking to reinforce their foundational knowledge, stay ahead of evolving threats, and proactively secure their organisation’s critical infrastructure against attacks.

Benefits of our bespoke workshops:

Raise cybersecurity awareness within your organisation.

Up-skill your technical teams on how to more effectively defend your systems.

Deploy and improve internal protections to defend against attacks.

Our other training courses

In addition to Cybersecurity Training we also offer Penetration Testing and Cybersecurity Consultancy to offer a comprehensive suite of cybersecurity services.

Penetration Testing

Penetration Testing is one of the most effective ways to assess your systems security, discover vulnerabilities, and determine the real-world risk of any vulnerabilities that are present.

It goes much further than simply checking for missing software updates or weak passwords. Plus, it’s more effective than simple vulnerability scanning.

Cybersecurity Consultancy

From security architecture to security assessment, we offer a wide range of services to ensure the protection of your assets. We use a highly flexible methodology to ensure that our services are fully aligned to your needs, delivered by a bespoke team with the precise skills and depth of experience needed to understand your issues and then effectively deliver the desired outcome. With our security assurance services, you can have peace of mind knowing that your systems and data are well-protected.

WE CAN FIND YOUR VULNERABILITIES

BEFORE YOU ARE BREACHED

GET IN TOUCH

Play Cover Track Title
Track Authors