Windows Exploitation and Defense


Course Description:

This course immerse you in both offensive and defensive view of Windows security. Knowing how to break into the system is not the same as understanding how to defend against the attack. You will learn the latest hacking methodologies and use of different attack methods on the different Windows operating system and Windows Applications throughout the 4-days training.

Coupled with customize scenario set in real-world security lab environment, you are able to expect the attacks you are most likely to face in your work and how to apply the best practices to secure the interconnected network within your organization. The course provides you with not only the attack techniques, but also countermeasure methodologies to protect the IT infrastructure to mitigate risks.

Course Outline:

  • Automated Windows Exploitation with Metasploit
  • Scanning and Enumeration
  • Remote Exploitation with Metasploit
  • Meterpreter
  • Exploit Writing for Windows
  • EIP – The Holy Grail for Hackers
  • Buffer Overflow
  • Advance Exploitation
  • Exploit Mitigation Techniques

Learning Outcome:

  • Discover vulnerabilities in various Windows operating systems
  • Able to create exploits and take advantage of vulnerabilities
  • Explore various Windows OS attacks and learn how to secure them with various techniques
  • Use different tools to secure the environment of Windows OS
  • Learn how to harden operating systems in centralized environment and how to apply best practices towards security configuration
  • Understanding the commonly used server roles and explore how to secure it

Who should attend:

Penetration tester, information security personnel, network administrator, system engineer and anyone who is responsible in information security and data protection


4 day

Be an InfoRisk 360° Windows Security Specialist Today!



Password Reset
Please enter your registered e-mail address for InfoRisk 360 Instructor Portal. You will receive a new password via e-mail.