@ 2023 Cyber Dojo. All rights reserved.
Description
Curriculum
Instructor
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Enterprise Penetration Tester course. This course equips participants with the essential skills and techniques for conducting thorough penetration tests in modern enterprise environments. Through hands-on labs and real-world scenarios, students will learn to identify vulnerabilities, exploit systems, and effectively communicate security risks. By the end of the course, participants will be prepared to execute high-value penetration tests, ensuring a deeper understanding of the attacker mindset and strategies to enhance organizational security.
- Key Components of Enterprise Penetration Tester:
- Planning and Preparation: Understand how to scope and prepare for effective enterprise penetration tests.
- Reconnaissance Techniques: Master reconnaissance methods, including OSINT and social engineering, to gather critical information.
- Vulnerability Scanning: Utilize advanced tools like Nmap and Masscan to identify targets and vulnerabilities within environments.
- Initial Access Techniques: Perform password guessing and exploitation using Metasploit and other frameworks for gaining entry.
- Post-Exploitation: Execute privilege escalation and gather intelligence from compromised systems to extend access.
- Lateral Movement: Learn techniques to move through networks undetected, using tools like Impacket and C2 frameworks.
- Active Directory Attacks: Understand and exploit Kerberos authentication and AD vulnerabilities for domain privilege escalation.
- Cloud Penetration Testing: Conduct reconnaissance and attacks in Azure and Entra ID environments.
- Reporting Skills: Develop comprehensive reports that communicate identified risks to stakeholders effectively.
- Hands-On Training:
- The course offers extensive lab-based exercises, providing students with practical experience applying course concepts.
- Labs are based on real-world scenarios, allowing students to grasp the challenges they’ll face in their careers.
- Certification Opportunity:
- You can obtain the GPEN validating the acquired skills and knowledge.
Get the course now to unlock the gateway to a thriving and lifelong career in Cybersecurity.
Certificate Sample..
————————————————————————
- Important Notice:
- This course is independent and not sponsored, endorsed, or affiliated with organizations such as IBM, SANS, INE, Microsoft, Cisco, and others.
- This course is presented as a prerecorded program, offering flexibility for learners to access the content at their own pace and convenience.
- The modules are designed to be consumed in a sequential manner, allowing participants to navigate through the material at a time that suits their individual schedules.
- Please note that being prerecorded, the course does not involve live, real-time interactions with instructors except through the one-to-one support sessions.
- Participants can pause, rewind, and replay the content as needed to enhance their understanding of the subject matter.
- It includes opportunities for open discussion through dedicated discussion boards that enable participants to engage with peers, share insights, and ask questions related to the course content
————————————————————————
:إشعار مهم
هذا الكورس مستقل وليس برعاية أو مصادقة أو مرتبط بمنظمات مثل اي بي ام او سانز او اي ان اي او مايكروسوفت اوسيسكو او غيرهم من المنظمات
يتم تقديم هذا الدورة كبرنامج تم تسجيله مسبقًا، مما يوفر مرونة للمتعلمين للوصول إلى المحتوى بوتيرتهم وراحتهم
تم تصميم الوحدات لتكون مستهلكة بطريقة تسلسلية، مما يتيح للمشاركين التنقل في المواد في وقت يناسب جداولهم الفردية
يرجى ملاحظة أنه نظرًا لأنها مسجلة مسبقًا، لا تشمل الدورة تفاعلات حية في الوقت الحقيقي مع المدرسين باستثناء عن طريق جلسات الدعم الفردية
يمكن للمشاركين إيقاف التشغيل والترجيع وإعادة تشغيل المحتوى حسب الحاجة لتعزيز فهمهم للموضوع
تتضمن الدورة فرصًا للنقاش المفتوح من خلال لوحات نقاش مخصصة تمكن المشاركين من التفاعل مع الزملاء، ومشاركة الأفكار، وطرح الأسئلة المتعلقة بمحتوى الدورة
Curriculum
- 9 Sections
- 116 Lessons
- 52 Weeks
Expand all sectionsCollapse all sections
- Introduction to Cyber Dojo Platform3
- Overview1
- Chapter 1: Comprehensive Pen Test Planning, Scoping, and Recon19
- 3.1Chapter Overview3 Minutes
- 3.2Defining Terms27 Minutes
- 3.3Types of Pen Tests14 Minutes
- 3.4Building an Infrastructure15 Minutes
- 3.5Linux for Pen Testers16 Minutes
- 3.6Lab 1.1: Linux for Pen Testers39 Minutes
- 3.7Overall Process10 Minutes
- 3.8Pre-Engagement27 Minutes
- 3.9Rules of Engagement17 Minutes
- 3.10Lab 1.2: Scope and RoE Role Play20 Minutes
- 3.11Reconnaissance Overview28 Minutes
- 3.12Organizational Recon17 Minutes
- 3.13Assignment: Lab 1.3: Organizational Reconnaissance3 Days
- 3.14Infrastructure Recon32 Minutes
- 3.15Lab 1.4: Infrastructure Reconnaissance27 Minutes
- 3.16User Recon17 Minutes
- 3.17Lab 1.5: User Reconnaissance17 Minutes
- 3.18Automated Recon with SpiderFoot3 Minutes
- 3.19Lab 1.6: Automated Recon with SpiderFoot20 Minutes
- Chapter 2: In-Depth Scanning and Initial Access31
- 4.1Chapter Overview4 Minutes
- 4.2Scanning Goals, Types, and Tips11 Minutes
- 4.3Port Scanning10 Minutes
- 4.4Nmap10 Minutes
- 4.5OS Fingerprinting and Version Scanning6 Minutes
- 4.6Nmap Scripting Engine (NSE)6 Minutes
- 4.7Lab 2.1: Nmap35 Minutes
- 4.8TryHackMe Bonus Lab: Nmap: The Basics33 Minutes
- 4.9TryHackMe Bonus Lab: Nmap Live Host Discovery33 Minutes
- 4.10TryHackMe Bonus Lab: Nmap Basic Port Scan20 Minutes
- 4.11TryHackMe Bonus Lab: Nmap Advanced Port Scans31 Minutes
- 4.12TryHackMe Bonus Lab: Nmap Post Port Scans26 Minutes
- 4.13Quiz: Nmap60 Minutes41 Questions
- 4.14Masscan & EyeWitness20 Minutes
- 4.15Lab 2.2: Cloud Scanning20 Minutes
- 4.16Netcat for the Pen Tester13 Minutes
- 4.17Lab 2.3: Netcat’s Many Uses26 Minutes
- 4.18Vulnerability Scanning and Vulnerability Scanners10 Minutes
- 4.19TryHackMe Bonus Lab: Nessus38 Minutes
- 4.20TryHackMe Bonus Lab: OpenVAS28 Minutes
- 4.21Initial Access11 Minutes
- 4.22Password Guessing32 Minutes
- 4.23Lab 2.4: Password Guessing Attacks with Hydra24 Minutes
- 4.24Cloud Spotlight: Microsoft 365 Password Attacks12 Minutes
- 4.25Lab 2.5: Microsoft 365 Password Attacks25 Minutes
- 4.26Exploitation9 Minutes
- 4.27Exploit Categories20 Minutes
- 4.28Metasploit and Meterpreter31 Minutes
- 4.29Lab 2.6: Meterpreter35 Minutes
- 4.30Quiz: Scanning and Initial Access Rooms2 Days11 Questions
- 4.31Assignment: Add your TryHackMe Profile Link30 Minutes
- Chapter 3: Assumed Breach, Post-Exploitation, and Passwords29
- 5.1Chapter Overview4 Minutes
- 5.2Assumed Breach28 Minutes
- 5.3Post-Exploitation10 Minutes
- 5.4Situational Awareness5 Minutes
- 5.5Linux Situational Awareness7 Minutes
- 5.6Windows Situational Awareness13 Minutes
- 5.7Seatbelt4 Minutes
- 5.8Lab 3.1: Seatbelt12 Minutes
- 5.9Privilege Escalation10 Minutes
- 5.10Linux Privilege Escalation15 Minutes
- 5.11Lab 3.2: Linux Privilege Escalation36 Minutes
- 5.12Assignment: Linux Privilege Escalation3 Days
- 5.13Windows Privilege Escalation18 Minutes
- 5.14Lab 3.3: Windows Privilege Escalation10 Minutes
- 5.15Assignment: Windows Privilege Escalation3 Days
- 5.16BloodHound12 Minutes
- 5.17Lab 3.4: BloodHound19 Minutes
- 5.18Quiz: BloodHound AD Enumeration1 Day3 Questions
- 5.19Passwords and Credential Access16 Minutes
- 5.20Understanding Password Hashes21 Minutes
- 5.21Lab 3.5: MSF psexec, hashdumping, and Mimikatz19 Minutes
- 5.22Password Cracking22 Minutes
- 5.23Lab 3.6: John the Ripper20 Minutes
- 5.24Lab 3.7: Hashcat23 Minutes
- 5.25Quiz: Password Cracking2 Hours14 Questions
- 5.26Sniffing and Cracking9 Minutes
- 5.27Responder13 Minutes
- 5.28Lab 3.8: Responder20 Minutes
- 5.29Quiz: Wonderland3 Days4 Questions
- Chapter 4: Lateral Movement and Command and Control (C2)17
- 6.1Chapter Overview4 Minutes
- 6.2Pivoting and Lateral Movement13 Minutes
- 6.3LAB 4.1: Pivots28 Minutes
- 6.4Windows Lateral Movement34 Minutes
- 6.5LAB 4.2: Running Commands with SC and WMIC30 Minutes
- 6.6Impacket8 Minutes
- 6.7LAB 4.3: Impacket19 Minutes
- 6.8Pash-the-Hash8 Minutes
- 6.9LAB 4.4: Pass-the-Hash22 Minutes
- 6.10Command and Control (C2)10 Minutes
- 6.11Sliver8 Minutes
- 6.12LAB 4.5: Sliver6 Minutes
- 6.13PowerShell Empire7 Minutes
- 6.14LAB 4.6: Empire25 Minutes
- 6.15Evasion34 Minutes
- 6.16Application Control Bypass12 Minutes
- 6.17LAB 4.7: MSBuild17 Minutes
- Chapter 5: Domain Domination, Azure Annihilation, and Reporting24
- 7.1Chapter Overview3 Minutes
- 7.2Kerberos18 Minutes
- 7.3Kerberoast10 Minutes
- 7.4Lab 5.1: Kerberos12 Minutes
- 7.5Domain Dominance22 Minutes
- 7.6Lab 5.2: Domain Dominance24 Minutes
- 7.7More Kerberos Attacks6 Minutes
- 7.8Silver Ticket5 Minutes
- 7.9Lab 5.3: Silver Ticket20 Minutes
- 7.10Golden Ticket6 Minutes
- 7.11Lab 5.4: Golden Ticket13 Minutes
- 7.12Domain Privilege Escalation6 Minutes
- 7.13Quiz: Breaking Windows3 Days31 Questions
- 7.14Azure Intro10 Minutes
- 7.15Azure AD17 Minutes
- 7.16Azure Recon21 Minutes
- 7.17OpenID6 Minutes
- 7.18Azure Infrastructure7 Minutes
- 7.19Running Commands on Azure6 Minutes
- 7.20ngrok5 Minutes
- 7.21Permissions on Azure14 Minutes
- 7.22Cloud Labs Walkthrough14 Minutes
- 7.23Reporting35 Minutes
- 7.24Pentest Report Sample14 Minutes
- Final Exam1
- Project: Dojuicer Penetration Test Assessment3
Review
Offensive Operations, Pen Testing, and Red Teaming

350 $
250 $
100% positive reviews
60 students
116 lessons
Language: English
7 quizzes
Assessments: Self
Granted Access Time: 52 weeks
Skill level All levels
Courses you might be interested in
Cyber Defense
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Security Operations Analyst course. This course equips learners with foundational skills and knowledge necessary to operate...
-
87 Lessons
Offensive Operations, Pen Testing, and Red Teaming
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Web Application Penetration Tester course. This course equips participants with the skills to conduct thorough web...
-
114 Lessons
Cybersecurity and IT Essentials
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Cybersecurity Essentials course. This course delves into the fundamental principles of computer and information security, empowering...
-
97 Lessons
Digital Forensics, Incident Response & Threat Hunting
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Windows Forensic Examiner course. This course equips participants with advanced forensic analysis skills specifically for...
-
54 Lessons
Offensive Operations, Pen Testing, and Red Teaming
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Enterprise Penetration Tester course. This course equips participants with the essential skills and techniques for conducting...
-
116 Lessons
Upcoming Events
Most Popular Blog
From PICERL to DAIR: The New Incident Response Process with a Flexible Approach
May 17, 2024
No Comments
Read More »
Most Popular Course
-
97 Lessons
Cybersecurity and IT Essentials
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Cybersecurity Essentials course. This course delves into the fundamental principles of computer and information security, empowering...