top of page

Programas de Cyberium

En el mundo digital de rápida evolución de hoy, mantenerse al día con las tecnologías emergentes y las tendencias es de suma importancia. Los Programas de Cyberium, desarrollados por el proveedor líder de formación digital ThinkCyber, tienen como objetivo cerrar esta brecha de conocimiento. Estos programas ofrecen experiencias de aprendizaje integrales en un amplio espectro de campos cibernéticos.

Intro a la Ciber

XE101

zx.png
image.png
image.png

Programas de Cyberium

image.png

Prerequisites

  • Networking Knowledge

  • Linux & Windows OS

  • Experience with Nmap and  Msfconsole

image.png

Duration Options

  • Self-paced: 5-10 week

  • Trainer-led: 48 hours

Core Features of Cyberium Arena

Labs

Enhance training with defense and attack tasks.

Books

Tailored coursebooks for cybersecurity studies.

Scenarios

Diverse situations mimicking real professional challenges.

Projects

Integrated projects to demonstrate acquired knowledge.

Programas de Cyberium

Network Security Fundamentals

Covers principles of network security and packet tracer subnetting.

Network Protocols

Explores DHCP, SMB, LLMNR, and NBNS protocols.

Frameworks

Focuses on enumeration, exploitation, and Pass-The-Hash techniques.

image.png
image.png

Programas de Cyberium

Information Collection

    

Techniques for gathering network data using Responder.

Password Cracking

     

Methods to exploit collected information for password cracking.

Programas de Cyberium

Domain Setup

    

Learn to configure and deploy Active Directory Domain Services (AD DS), including DNS integration, forest/domain creation, and organizational unit structure.

Domain Protocols

    

Master authentication mechanisms through Kerberos ticket management and LDAP query operations for secure directory access and management.

Domain Events

     

Analyze domain controller logs, monitor security events, and track user/group modifications for effective threat detection and auditing.

Programas de Cyberium

Text Manipulation

PowerShell commands for efficient text processing and manipulation.

Event Logs

Techniques to access and analyze Windows event logs using PowerShell.

Enumeration

Methods for system and network enumeration through PowerShell commands.

image.png
image.png

Programas de Cyberium

image.png

Scanning

Techniques to identify vulnerabilities in network domains.

image.png

Enumeration

Methods for further probing, including the use of Rpcclient.

image.png

Vulnerability Assessment

Analyzing scan and enumeration results to identify weak points.

image.png

Programas de Cyberium

image.png

Msfconsole

   

Metasploit framework for penetration testing and exploitation.

image.png

Impacket

   

Collection of Python classes for working with network protocols.

image.png

CrackMapExec

   

Post-exploitation tool for assessing and exploiting networks.

image.png

Programas de Cyberium

Tool

Purpose

Mimikatz

Extracting plaintext passwords, hashes, and tickets

PSexec

Light-weight telnet-replacement for executing processes on remote systems

Techniques for effectively blocking ports

Golden Tickets

Forging Kerberos tickets for persistent domain access

Programas de Cyberium

image.png

Classic Encryptions

  

Historical encryption methods that laid the foundation for modern cryptography.

image.png

Modern Encryptions

   

Current encryption techniques used in cybersecurity to protect sensitive data.

Comprehensive Network Security

Understanding Vulnerabilities

Identifying weak points in network and organizational domain security.

Exploitation Techniques

Learning various methods used by attackers to breach security.

Defensive Strategies

Implementing countermeasures to protect against identified vulnerabilities and attacks.

image.png

Sede en España:

Sabadell (Barcelona), España

+34 930.289.919 

Sede en Israel:

Moshe Aviv Tower, Ramat Gan

+972.3.9629018

Síganos en

  • LinkedIn
  • Facebook

© 2024 por ThinkCyber

bottom of page