Train in the Trenches
Our InfoSec, risk, and technology experts are here to make your team more secure. We offer in-depth training across a variety of cybersecurity topics that will help individuals at every stage of their careers.
InfoSec Training
-
Advanced Exploitation Security Training
This is an instructor-led course that will teach students to recognize potential exploitation paths through a series of structured labs that simulate common attacks performed by penetration testers. Through a series of step-by-step simulated attacks, the instructor provides students insight into the attack methodology, possible outcomes, and suggested mitigation steps. The training is perfect for Network Administrators, Security Analysts, and IT Managers to be proactive in monitoring, identifying, and mitigating malicious activity in a typical network.
Exploitation scenarios:
• Wireless HID Device Attacks
• Cross-Site Scripting
• Hash Cracking
• Hash Relay Attacks
• Session Cookie Manipulation
• Attacking WordPress
• MFP Printer Attacks
• Reverse Command Shells
• Windows Privilege Escalation
• Configuration Vulnerabilities
• Process Injection
• Maintaining Persistence
• Linux Privilege Escalation
• FreeNAS Privilege EscalationDedicated virtual lab:
• Windows Active Directory
• Windows Server 2019 Member Servers
• Windows 10 Workstations
• Ubuntu Linux Desktop and Servers
• FreeNAS Server
• Firebird Database
• MS SQL Server 2017 Database
• MS Exchange 2016 with Outlook Web Access
• PfSense Firewall to simulate attacks from the InternetTools used:
• Metasploit Framework
• Hashcat, Pypykatz, Wifite, Dirb
• BloodHound, Responder, Mitm6, NTLMRelayx, Secretsdump
• Burp Suite
• Microsoft PsTools
• DBG Custom ToolsInstructor: Ryan Primeau
Cost: $2,750.00 + applicable taxes
There is a limited number of seats available for each training session to maintain the quality of the session.
-
Hardening Windows Networks Training
You will learn in a dedicated virtual lab that resembles a real-world network, which includes Active Directory and common server and workstation configurations. We start by learning common exploitation techniques using Kali Linux and common administration tools, followed by implementing effective countermeasures to defend against these common attacks, tools, and techniques. Finally, you will apply operating system and Active Directory hardening techniques, mitigate legacy software risks, and design tolerant networks that are resistant to present and future threats.
Dedicated virtual lab:
• Windows 10 Workstation
• Windows Server
• Microsoft Windows SQL Server
• Microsoft Exchange Server
• Active Directory
• Open Source Firewall
• Open Source Proxy Server
• Open Source Intrusion Detection
• Log Collection & Analysis
• Kali LinuxHardening scenarios:
• Common Exploitation Techniques
• Windows Event Auditing
• Active Directory Group Policies
• Account & Password Security
• Host Firewall Configuration
• Software Restriction Policy
• Oracle Java Deployment Ruleset
• Proxy Server & Firewall
• Log Monitoring and Alerting
• SNORT intrusion detectionFinal Lab:
Students will take what they have learned during the course and apply it to a test network that mirrors the main virtual lab. This will include running automated attacks to test the implementation of:
• Network intrusion detection, logging, and alerting
• Core hardening concepts for Windows hostsInstructor: Matthew Brown
Cost: $3,275.00 + applicable taxes or
$1,500.00 + applicable taxes (self-paced training)There is a limited number of seats available for each training session to maintain the quality of the session.
Instructors
-
Director of Training
With vast experience in penetration testing, security consulting, and systems administration, Ryan is responsible for leading and assisting in internal security assessments and penetration tests for public and private sector clients. He conducts technical research into threats and vulnerabilities, assessing risk, and recommending countermeasures. Ryan is also responsible for maintaining penetration testing/vulnerability assessment environments, continuously researching new tools/techniques, and updating testing methodologies. To educate Digital Boundary Group’s clients, Ryan prepares and delivers comprehensive reports explaining threat/risk findings and recommended action for stakeholders up to C-level, as they relate to business impact. -
Senior Security Specialist (CISSP, OSCP, CISSO)
With over eight years of experience in a security operations center overseeing incident response for clients, Matthew is responsible for developing training material for use in a cyber range for red, blue, and forensic team training purposes. He draws on his vast experience with various clients in government (federal/provincial/municipal), utilities, police services, financial/insurance, healthcare, education, professional services, retail, and manufacturing.