Training Classes

Let us teach you what we know



Online Advanced Exploitation Security Training

Digital Boundary Group’s new online Advanced Exploitation Security Training Course is based on more than 15 years of security assessment and penetration testing experience.

Students will learn to recognize potential exploitation paths in a hands-on virtual environment that simulates a real-world network.

HIGHLIGHTS
Students will experience the following exploitation scenarios:

  • Wireless HID Device Attacks
  • Cross Site Scripting
  • Hash Cracking
  • Hash Relay Attacks
  • Session Cookie Manipulation
  • Attacking WordPress
  • MFP Printer Attacks
  • Reverse Command Shells
  • Windows Privilege Escalation
  • Configuration Vulnerabilities
  • Process Injection
  • Maintaining Persistence
  • Linux Privilege Escalation
  • FreeNAS Privilege Escalation

Each student will have a dedicated virtual lab consisting of:

  • Windows Active Directory
  • Windows Server 2019 Member Servers
  • Windows 10 Workstations
  • Ubuntu Desktop Linux
  • Ubuntu Linux Servers
  • FreeNAS Server
  • Firebird Database
  • MS SQL Server 2017 Database
  • MS Exchange 2016 with Outlook Web Access
  • pfSense Firewall to simulate attacks from the Internet

Tools used by a student include:

  • Metasploit Framework
  • Hashcat
  • Bloodhound
  • Burp Suite
  • Microsoft PSTools
  • DBG Custom Tools