Introduction Courses

If you’re looking to get an idea of how an attacker may gain access to and exploit your network, or if you just want to learn the art, these are the courses for you.

CVL001: Introduction to Operating Systems

Course Goals:

This course is designed to get the average computer user in line with modern and dynamic operating systems and changing environments in regards to security and performance as well as management.

Course Outline

Target Audience:

The course is designed to be a beginner level course with hands on labs and workshops of the course topics and subjects. The course is suitable for any person with the right desire to learn and get into security.

Students must possess basic IT knowledge and must be in position to understand how inter-connected systems work.

Section A. Types and Feature Implementation
  1. Windows
  •  System Architecture
  •  Process Management
  •  Memory Management
  •  Input/output Operations, System Interfaces and Management(APIs, scripting and system tools)
  •  Windows Lab
  1. Linux
  •  System Architecture
  •  Process Management
  •  Memory Management
  •  Input/output Operations, System Interfaces and Management(APIs, scripting and system tools)
  •  Linux Lab
  1. Networking Operating Systems
  •  System Architecture
  •  Process Management
  •  Memory Management
  •  Input/output Operations, System Interfaces and Management(APIs, scripting and system tools)
  •  Cisco, *BSD, and other NOS labs
  1. Mobile Operating Systems
  •  System Architecture
  •  Process Management
  •  Memory Management
  •  Input/output Operations, System Interfaces and Management(APIs, scripting and system tools)
  •  IOS, Android, Windows and other mobile OS labs
Section B. Security Aspects of Operating Systems
  •  System Services
  •  Security Features in Modern Operating Systems
  •  Hardware / Software Security Integration
  •  Applied Cryptography within modern systems
  •  Hands on Labs exploring security features and aspects
Section C. System Administration and Services
  • DNS, Active Directory, Web, SSH, Mail, Cloud and integral services within IT infrastructures
  • Modern System Administration
  • Secure Aspects of System Administration
  • System, Cloud and Security Administration labs
  • Data management and data stores/databases
Section D. Virtualisation
  • Introduction to Virtualisation, types and use cases
  • Virtualisation Based Security in modern applications and operating systems
  • Virtualisation labs and workshop
Section E. Encryption and Cryptography
  • Introduction to cryptography
  • Asymmetric and Symmetric Cryptography
  • Managing and working with key management systems and PKI infrastructures
  • Applied cryptography in enterprise environments
  • Block chain
Section F. Final Workshop / CTF Class Event
  • End to End Challenges and material learned throughout the course

CVL002 – Professional Penetration Testing

The   Professional Penetration   testing course is a practical and comprehensive course on penetration testing. A hands on, high pace training course built with the goal of creating knowledgeable IT security professionals with real world skills to handle security assessments and create value through offensive security.

It  builds  strong  foundations  by  giving  theoretical  lessons  enforced  with  practical exercises held in the most sophisticated virtual lab environment in the world.

At  the  end  of  the  training course ,  the  student  will be  challenged with  a  real world assessment where  he/she  must  produce  a  commercial – grade  penetration  testing report that correctly identifies the weaknesses in an the environment.

Course Outline

Target Audience:

The Hands on Hacking course will provide an introduction to the wonderful and exciting art of ethical hacking. Course attendees need a familiarity of Linux, be comfortable working with the command line and have a basic understanding of networking. Programming skills are an advantage but not essential.

Section A. System Security
  •  Systems Insecurities and Vulnerabilities
  •  Hunting and Finding System Flaws
  •  Tactical System Exploitation
  •  System Assessment Labs
Section B. Network Security
  • Network layers, services and applications
  • Mapping, Scanning and Recon
  • Network Appliances and Bypasses
  • Tactical Network Exploitation
  • Tools and Labs
Section C. Web Application Security
  • Introduction to modern web technologies and stacks, developer operations
  • Recon and Profiling
  • Web Vulnerabilities break down
  • Tools and Labs
Section D. Scripting for Pen testers
  •  Introduction
  •  PowerShell, Python, Ruby, Perl and Bash Fundamentals
  •  Offensive Scripting Functionality
  •  Labs
Section E. Encryption and Cryptography
  •  Introduction to post exploitation
  •  Information Gathering
  •  Exploitation over the Network
  •  Post Exploitation
  •  Labs

The student is required to have a modern laptop device that can support virtualization technologies. With a minimum of 8 GB RAM and 60 GB of storage.

Prerequsities

Whilst we provide everything you need to know on the course, experience of working in Windows and Linux environments as well as using command line interfaces would be advantageous.

You will need to bring a laptop with local administrator/root access.

To book a training course please contact us at training@cvlabs.io or call +25620209067