top header
top gradation HOME top vertical line top vertical line top vertical line top vertical line top vertical line top vertical line top vertical line menu gray
black line 2
menu gray tab More About ATI
menu blue ATI — Who We Are
white line
menu blue Contact ATI Courses
white line
menu blue List Of ATI Courses
white line
menu blue Attendees Testimonials
white line
menu blue The ATI FAQ Sheet
white line
menu blue Suggestions/Wait List
white line
menu blue New Courses
white line
menu blue Become an ATI Instructor
menu gray tab site resources
menu blue Acoustics & Sonar
white line
menu blue Rockets & Space
white line
menu blue GPS Technology
white line
menu blue ATI Blog
white line
menu blue ATI Space News
white line
menu blue ATI Site Map
white line
menu blue ATI Staff Tutorials
white line
menu blue ATI Sampler Page
white line
menu gray tab bar
menu gray tab courses
white line
menu blue Current Schedule
white line
menu blue Onsite Courses
white line
menu blue Register Online
white line
menu blue Request Brochure
white line
menu blue Free On-Site Price Quote
white line
menu blue Download Catalog
white line
menu blue Distance Learning
black line  

Metasploit® Framework, Penetration Testing Methodology & Malware Analysis (Triage) course


Share |

Summary:

Technical Training Short On Site Course Quote

Penetration Testing Methodology was developed to provide students with a comprehensive hands-on exposure to the processes, tools and procedures used by penetration testers. This course teaches students concepts and methods involved in targeting, infiltrating and expanding access within networks. The course allows students to understand the attacker mindset and learn how to simulate a real-world attacker’s thoughts and actions, all for the purpose of helping to improve the security posture of the organizations they support.

Include in this course is an additional module focusing specifically on the Metasploit Framework, which provide students with an introduction to an exploitation framework or suite of penetration testing tools commonly used by penetration testers. This module provides students with an in-depth overview of the capabilities and contents of the Metasploit Framework and covers how to install it, maneuver within its modules/menus, and maintain it.

Additionally, students will complete the Malware Analysis (Triage) module which provides students with a comprehensive hands-on exposure to the processes, tools and procedures used to identify common types of malware and to quickly determine their capabilities and threat level. This course teaches students concepts and methods involved in finding, analyzing and characterizing malware to determine how severe of a threat it may pose within a system or network.

This course includes significant amounts of hands-on practical application of skills learned. Students are introduced to topics and concepts through lectures then given a series of lab exercises to reinforce that learning and build skill. Students must exercise the penetration testing methodology, process and analyze collected data, triage malware and develop the necessary tradecraft and stealth in order to successfully complete the goals of the course.

Tuition:

Prerequisites

Students attending the course should have a strong understanding of how data traverses a network, basic UNIX and Windows competency, and comfort working from the command line. Additionally, understanding of information assurance principles and penetration testing methodology are strongly recommended.

Topics

  • What is the Metasploit Framework (MSF)
  • MSF Installation and Set Up
  • Overview of Tools and Capabilities
  • Navigation within MSF Menus
  • Penetration Testing Terminology
  • Updating MSF
  • Documentation and Additional Information
  • Open source information gathering
  • Legal issues of penetration testing
  • Tradecraft
  • Sources of interesting information
  • Footprinting, scanning and enumeration
  • Fingerprinting
  • Vulnerability information
  • Exploiting hosts/devices
  • Situational Awareness
  • Log manipulation
  • Implants
  • Pivoting and redirection
  • Data exfiltration
  • Trusted networks
  • Passwords, reuse and cracking
  • Public-facing networks vs. intranets
  • Armitage
  • Keyloggers and sniffers
  • Anonymity
  • Malware Overview
  • Introductory Malware Identification
  • Process List Analysis
  • Suspicious Processes
  • Netstat, Open Port and Connection Analysis
  • Handles to Files and Other Resources
  • Suspicious .dlls and Drivers
  • Common Persistence Techniques
  • Rootkit Detection
  • Determining Network Awareness
  • Determining Other Capabilities (hiding, keyboard logging, taking screenshots)
  • Code Analysis Triage (Hex Editor)
  • Online Malware Capability & Signature Research

Tuition:

    Tuition for this course is ten-day course is $5895 per person at one of our scheduled public courses. Onsite pricing is available. Please call us at 410-956-8805 or send an email to ati@aticourses.com.

spacer