Cybersecurity
With increasing cybersecurity vulnerabilities, organizations must take a proactive approach to protecting their network. Through our cybersecurity training, participants will learn effective countermeasures to defend against common attacks and exploit techniques in a hands-on virtual environment that resembles a real-world network.
Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.
Advanced Exploitation Security Training
4 Days
Participants will learn to recognize potential exploitation paths in a hands-on virtual environment that simulates a real-world network. Participants will experience exploitation scenarios such as:
- Wireless HID Device Attacks
- Cross Site Scripting
- Relay Attacks
- Session Cookie Manipulation
- Attacking WordPress
- Reverse Command Shells
- Windows Privilege Escalation
- Configuration Vulnerabilities
- Process Injection
- Maintaining Persistence
- Linux Privilege Escalation
Hardening Windows Networks Training Program
4 Days
Hardening Windows Networks Training Program goes beyond theory and best practices to deliver proven, field-tested solutions for mitigating, monitoring, and protecting Microsoft Windows based networks. Participants will learn effective countermeasures to defend against common attacks and exploit techniques in a hands-on virtual environment that resembles a real-world network
Live Fire
Live Fire is a platform used to simulate common post-compromise attacks. It is used to evaluate the ability of an organization’s SIEM solution to receive, properly analyze, and alert the internal security team of a simulated active security breach. Unlike traditional testing, Live Fire takes an integrated approach to assess information security defenses by combining multiple testing strategies into a comprehensive offensive engagement.