Internal Audit Training, IT Audit Training Courses, Information Security Training - CPE Interactive

Continuing Professional Education for Audit, Assurance, & Info Security

Course Description

In this intensive hands-on course, you will learn how to detect, assess, and exploit numerous CyberSecurity vulnerabilities that stem from improper software configuration, software inconsistencies, and design flaws within an overall network infrastructure and applications. You will also examine useful methods for uncovering wired and wireless network backdoors. Working through a series of hands-on exercises, you will discover the most common CyberSecurity mistakes made by vendors, administrators, and users, and master proven tactics for thwarting them.

You will discover methods for locating and confirming frequently exploited Web and other TCP/IP application vulnerabilities. You will get proven tips on building a powerful CyberSecurity testing tool kit using both freeware and commercial tool alternatives that will let you test for frequently exploited TCP/IP network and computing platform-specific security vulnerabilities. In addition, you will review a detailed analysis of features, platform applicability, and operational considerations associated with a wide array of CyberSecurity security testing tools for use on both Windows and Unix workstations.

Learning Objectives

  • Identify the key incremental phases and deliverables in vulnerability and penetration testing
  • Understand the importance of clear definition and communication of the “Rules of Engagement” for all parties involved
  • Assess the risks, strengths, and weaknesses in different categories of testing tools
  • Learn how to develop and use advanced CyberAudit software techniques to increase audit coverage

Course Outline

Developing a CyberSecurity Security Testing Plan

  • Delineating between CyberSecurity vulnerability testing and penetration testing
  • Sources for CyberSecurity vulnerability and threat alerts.and tools
  • Important cautions in using scanning tools
  • Defining a vulnerability and penetration testing methodology
  • Guidelines for conducting the tests: "Rules of Engagement"
  • Risks of using cloud-based vulnerability testing tools
  • Building a portable vulnerability testing toolkit

CyberSecurity Discovery and Host Enumeration Tools and Techniques

  • Network host discovery and enumeration CyberAudit objectives
  • Leveraging public information about a target organization
  • Locating network hosts
  • Network host and application enumeration: port scanning, SNMP probes

CyberSecurity Vulnerability Scanning and Automated Exploit Consoles

  • CyberSpace vulnerability scanning objectives
  • Network vs. host vulnerability testing tools
  • Configuring, running, and interpreting the results of network vulnerability scanners

Detecting and Penetrating Microsoft Windows Network Applications

  • Windows services and TCP/IP applications, including file sharing
  • Anonymous use exploits: registry, Active Directory/LDAP

Detecting and Penetrating Unix Network Applications

  • Telnet, Finger, X-windows and other remote session and inquiry services
  • Attacking FTP, TFTP, NFS, and other file sharing protocols
  • Leveraging common SMTP vulnerabilities

Detecting and Penetrating Network Appliance and Infrastructure Applications*

  • Locating and profiling network devices
  • Testing and exploiting network device management port services
  • Detecting the presence of wireless networks through wired connections
  • Directory and lookup services: DNS, DHCP

Web Application CyberSecurity Scanning and Exploitation

  • Understanding the operation and weaknesses of the HTTP protocol*
  • Bypassing firewall/DMZ filtering in locating, enumerating, and testing web sites*
  • Deploying Web server/application scanning tools and exploit tools
  • Hands-on exploits for attacking common Web application vulnerabilities*

*Additional topics included in 3-day lecture and 5-day hands-on

Additional Information

Who Should Attend

IT Auditors
Information Security Managers, Analysts, and Architects
IT Management
IT Architects
System Administrators
Network Engineers
Consultants

Learning Level

Advanced

Delivery

Group-Live

Field

Auditing

Advanced Preparation

None

Recommended Prerequisites

Simplifying Audits of Network CyberSecurity (CY10)AND CyberAudits of Identity and Access Controls Management (CY01) or equivalent training. Familiarity with TCP/IP concepts and terminology, including the use of basic network software utilities found in Windows and/or Unix, is assumed.

Session Duration

Online: N/A

On Site: Lecture: 3 days; Hands-on: 5 days

CPE Credits: Lecture: 24; Hands-on: 40