• Online, Self-Paced
Course Description

When engaged in a penetration test for a client, after you successfully breach the perimeter, you may find yourself asking 'What next?' What are the steps that you need to perform before you can close the penetration test? In this course, Post Exploitation: Performing Infrastructure Analysis, you'll learn how to gather information pertaining to the network configuration and network services using both inbuilt as well as custom tools. Next, you'll also learn the best practices to follow while in an engagement. Additionally, you'll learn how to identify all the services that the compromised host is running in order to utilize and exploit later while attempting to extract data from the host. When you're finished with this course, you'll have the knowledge to gather information about infrastructure from the whole network, but most importantly, you'll learn how to use this information for a variety of purposes ranging from data exfiltration to privilege escalation.

Learning Objectives

  • Post Exploitation
  • Revisiting the Rules of Engagement
  • Analyzing Network Configuration with Inbuilt Tools
  • Analyzing Network Configuration with Uploaded Tools
  • Identifying Network Services

    Framework Connections

    The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

    Specialty Areas

    • Exploitation Analysis

    Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.