Requesting more information and/or the current price of this training is easy. We'll take any current promotions, subsidies, or customer discounts into account.
In de GPEN training wordt u aan de hand van een grote hoeveelheid praktijklabs meegenomen in het gehele proces van de penetratietest. Diverse methodieken, legal aspecten, tools en werkwijzen (zowel technisch als niet-technisch) komen uitgebreid aan bod zodat u na deze training in staat bent zelfstandig een penetratietest van begin tot eind te plannen, uit te voeren en te rapporteren.
Na de planningsfase waarin de scope wordt bepaald en gestructureerd gezocht wordt naar bruikbare (meta)data en kennis over de aan te vallen organisatie, vormen scanning (NMAP, Nessus, Scapy, Netcat), target exploitation (Metasploit, Meterpreter), wachtwoord aanvallen (John the Ripper, CAIN, Ophcrack) en manipulatie van web applicaties (Nikto, ZAP Proxy), een belangrijk onderdeel van deze training. We helpen u een omgeving op te zetten die alle hardware, software en tools bevat om succesvol penetratietesten uit te voeren in allerhande situaties.
In tegenstelling tot veel andere trainingen wordt er in GPEN zeer veel aandacht besteedt aan het stap-voor-stap te volgen proces van de penetratietest, de fouten die hierin gemaakt kunnen worden en de interpretatie van uitkomsten van tools.
Deze GPEN training is een ideale voorbereiding op het GIAC Penetration Tester (GPEN) examen en behandelt praktijkgericht de onderwerpen uit de SEC560: Network Penetration Testing and Ethical Hacking training.
Penetratietesters, ethical hackers, auditors die op zoek zijn naar meer technische kennis, IT- en netwerkbeveiligers die meer kennis willen opdoen van offensieve technieken en denkwijzen, Red en Blue team leden, SOC specialisten.
5 dagen
Onze GPEN training sluit aan op onderstaande exam objectives die als volgt gedefinieerd worden op de GIAC website:
The candidate will be able to use additional methods to attack password hashes and authenticate.
The candidate will be able to obtain and attack password hashes and other password representations.
The candidate will be able to enumerate users through different methods.
The candidate will be able to demonstrate the fundamental concepts associated with the exploitation phase of a pentest.
The candidate will be able to conduct port, operating system and service version scans and analyze the results.
The candidate will be able to use and configure the Metasploit Framework at an intermediate level.
The candidate will be able to use exploits to move files between remote systems.
The candidate will understand types of password attacks, formats, defenses, and the circumstances under which to use each password attack variation. The candidate will be able to conduct password guessing attacks.
The candidate will be able to demonstrate the fundamental concepts associated with pen-testing.
The candidate will be able to utilize a process-oriented approach to pentesting and reporting.
The candidate will demonstrate an understanding of the use of advanced Windows Power Shell skills during a penetration test.
The candidate will demonstrate an understanding of the use of advanced Windows command line skills during a penetration test.
The candidate will understand the fundamental concepts of reconnaissance and will understand how to obtain basic, high level information about the target organization and network, often considered information leakage, including but not limited to technical and non technical public contacts, IP address ranges, document formats, and supported systems.
The candidate will be able to use the appropriate technique to scan a network for potential targets.
The candidate will be able to conduct vulnerability scans and analyze the results.
The candidate will be able to utilize common web application attacks.
The candidate will demonstrate an understanding of the use of tools and proxies to discover web application vulnerabilities.
Note: The GPEN and GIAC marks are the property of GIAC, TSTC is not affiliated with nor endorsed by SANS or GIAC
Train smarter, not harder. TSTC’s unique method ensures you actually master the skills—and pass with confidence.
Learn more about TSTC