Programas de Cyberium
En el mundo digital de rápida evolución de hoy, mantenerse al día con las tecnologías emergentes y las tendencias es de suma importancia. Los Programas de Cyberium, desarrollados por el proveedor líder de formación digital ThinkCyber, tienen como objetivo cerrar esta brecha de conocimiento. Estos programas ofrecen experiencias de aprendizaje integrales en un amplio espectro de campos cibernéticos.
Intro a la Ciber
XE101



Programas de Cyberium

Prerequisites
-
Networking Knowledge
-
Linux & Windows OS
-
Experience with Nmap and Msfconsole

Duration Options
-
Self-paced: 5-10 week
-
Trainer-led: 48 hours
Core Features of Cyberium Arena
Labs
Enhance training with defense and attack tasks.
Books
Tailored coursebooks for cybersecurity studies.
Scenarios
Diverse situations mimicking real professional challenges.
Projects
Integrated projects to demonstrate acquired knowledge.
Programas de Cyberium
Network Security Fundamentals
Covers principles of network security and packet tracer subnetting.
Network Protocols
Explores DHCP, SMB, LLMNR, and NBNS protocols.
Frameworks
Focuses on enumeration, exploitation, and Pass-The-Hash techniques.


Programas de Cyberium
Information Collection
Techniques for gathering network data using Responder.
Password Cracking
Methods to exploit collected information for password cracking.
Programas de Cyberium
Domain Setup
Learn to configure and deploy Active Directory Domain Services (AD DS), including DNS integration, forest/domain creation, and organizational unit structure.
Domain Protocols
Master authentication mechanisms through Kerberos ticket management and LDAP query operations for secure directory access and management.
Domain Events
Analyze domain controller logs, monitor security events, and track user/group modifications for effective threat detection and auditing.
Programas de Cyberium
Text Manipulation
PowerShell commands for efficient text processing and manipulation.
Event Logs
Techniques to access and analyze Windows event logs using PowerShell.
Enumeration
Methods for system and network enumeration through PowerShell commands.


Programas de Cyberium

Scanning
Techniques to identify vulnerabilities in network domains.

Enumeration
Methods for further probing, including the use of Rpcclient.

Vulnerability Assessment
Analyzing scan and enumeration results to identify weak points.

Programas de Cyberium

Msfconsole
Metasploit framework for penetration testing and exploitation.

Impacket
Collection of Python classes for working with network protocols.

CrackMapExec
Post-exploitation tool for assessing and exploiting networks.

Programas de Cyberium
Tool
Purpose
Mimikatz
Extracting plaintext passwords, hashes, and tickets
PSexec
Light-weight telnet-replacement for executing processes on remote systems
Techniques for effectively blocking ports
Golden Tickets
Forging Kerberos tickets for persistent domain access
Programas de Cyberium

Classic Encryptions
Historical encryption methods that laid the foundation for modern cryptography.

Modern Encryptions
Current encryption techniques used in cybersecurity to protect sensitive data.
Comprehensive Network Security
Understanding Vulnerabilities
Identifying weak points in network and organizational domain security.
Exploitation Techniques
Learning various methods used by attackers to breach security.
Defensive Strategies
Implementing countermeasures to protect against identified vulnerabilities and attacks.
