ANT0404

Pentest of Network Infrastructure

Duration of training: 5 days

start date: Monday, June 23, 2025

sign up for a course

description
course

The material of this course will allow listeners to study the principles, mechanisms, and tools for conducting pentest – penetration testing of the network infrastructure and its connected services and applications. This course considers pentest as one of the processes necessary for building corporate cyber security architecture, so it also raises methodological issues of pentest organization, as well as the use of data obtained as a result of pentest.

course audience

Engineers conducting penetration tests; Engineers designing corporate cyber security architecture.

prerequisites

General cyber security knowledge at the ANT0000 course level, knowledge of TCP/IP networking at the ANT-N101 course level are required. Knowledge of threat modeling at the ANT0052 course level is recommended.

how it works
education

online course

The online course involves group classes with an instructor via video conferencing, in addition, homework and an exam.

for corporate clients

training for corporate clients includes online and self-study courses, as well as additional services required by corporate clients: organizing training plans for client departments, assessing the effectiveness of training, etc.

teacher
course

program
course

• Pentest goals and objectives.
• Pentest in the frame of corporate cyber security infrastructure.
• Cycle of life of cyber-attacks.
• Cyber-attack models.
• Pentest tools.
• Pentest result processing.
• Utilizing open source information. OSINT.
• Scanning targets and detecting vulnerabilities for a cyber-attack.
• Selecting right tools and methods for a cyber-attack.
• Organizing DDoS cyber-attacks on network.
• Organizing DoS cyber-attacks on network services.
• Organizing DoS cyber-attacks on applications.
• Traffic hijacking.
• Gaining access to Wi-Fi network.
• Methods of bypassing network cyber security systems.
• Organizing cyber-attacks on routing protocols.
• Organizing cyber-attacks on DNS protocols.
• Organizing cyber-attacks on DHCP protocol.
• Organizing cyber-attacks on authentication services.
• Organizing cyber-attacks on remote OS management services.
• Preparing malicious attachments.
• Basic principles of social engineering.
• Cyber-attacks on e-mail protocols.
• Gaining user OS access through malicious attachments.
• Extracting data and accounts.
• Escalation of account privileges.
• Extending control over other systems during a cyber-attack.
• Deleting traces of a cyber-attack.
• Use of malicious macros.
• Use of embedded links and objects.
• Use of HTML smuggling technic.
• Use of VBA-scripts.
• Use of powershell-scripts.
• Use of shellcods.
• Organizing phishing through the Microsoft Office installer.
• Organizing hidden communication channels.
• Threat model and pentest results.
• Managing risks based on data identified by a pentest.
• Modernizing corporate vulnerability accounting program.
• Modernizing strategic cyber security metrics.

Сourse purchase
options

individual

Cost — $1,550.00

Group online classes

Unlimited access to all the materials

Live webinars with teachers

Homework

Exam with certificate

Course dates:

pay for the course

corporate

Cost от $1,550.00

To obtain information about the final cost and clarify the date of the course, please fill out the form.

SUBMIT YOUR APPLICATION

* By clicking “send”, you agree to the Terms of Service And Privacy Policy