Level: Foundation

Cyber Vanguard Series-Cyber Strike

3 Day | Instructor Led

Cyber Vanguard Series - Cyber Strike takes the offensive and defensive assault tactics and applies them in several different real world scenarios. The entire course is hands on and builds upon the skills and knowledge the students have previously received. Applications include Offensive only - Hunt Teaming, Data Harvesting, and Asset Extraction, Defensive Only – Defending Your Assets, Setting Active Intrusion Systems, Vulnerability Assessment and Remediation, and Offensive and Defensive – Capture the Flag, where teams are pitted against each other to protect their own resources while attacking the opposing team.

Inquire About:
Cyber Vanguard Series-Cyber Strike

Ideal Candidates for Cyber Vanguard Series-Cyber Strike Class

Systems administration experience, familiarization with TCP/IP, and an understanding of UNIX, Linux, and Windows. This advanced course also requires intermediate-level knowledge of the security concepts covered in our Security+ Prep Course.

Cyber Vanguard Series-Cyber Strike Prerequisites

Systems administration experience, familiarization with TCP/IP, and an understanding of UNIX, Linux, and Windows. This advanced course also requires intermediate-level knowledge of the security concepts covered in our Security+ Prep Course.

What You'll Get in Cyber Vanguard Series-Cyber Strike

What You'll Learn in Cyber Vanguard Series-Cyber Strike

Applying network scanning and vulnerability assessment tools to effectively map out networks
and prioritize discovered vulnerabilities for effective remediation.
• Manipulating common network protocols to reconfigure internal network traffic patterns, as
well as defenses against such attacks.
• Analyzing Windows and Linux systems for weaknesses using the latest enterprise management
capabilities of the operating systems, including the super-powerful Windows Remote
Management (WinRM) tools.
• Applying cutting-edge password analysis tools to identify weak authentication controls leading
to unauthorized server access.
• Scouring through web applications and mobile systems to identify and exploit devastating
developer flaws.
• Evading anti-virus tools and bypassing Windows User Account Control to understand and defend
against these advanced techniques.

Cyber Vanguard Series-Cyber Strike Certification


Cyber Vanguard Series-Cyber Strike Outline


  • Remote registry analysis
  • Windows malware executable analysis
  • Common and extremely damaging enterprise Windows vulnerabilities
  • Windows file system and permission management analysis
  • Client-Side Attacks with Metasploit
  • Exploiting Network Services and Leveraging the Meterpreter
  • Evading Anti-Virus Tools with the Veil Framework
  • Metasploit Databases and Tool Integration
  • The Dilemma of Shell versus Terminal Access Illustrated
  • Bypassing the Dilemma with Pivoting Relays


  • Network Mapping and Discovery
  • Optimizing scanning techniques for efficient host discovery
  • Passive discovery and system analysis
  • Advanced enumeration with interactive and automated interrogation tools
  • Enterprise Vulnerability Assessment
  • Data harvesting for effective vulnerability assessment
  • Manual and automated vulnerability correlation
  • Vulnerability prioritization for remediation
  • Open-source and commercial tools for effective vulnerability assessment
  • Assessing network infrastructure as part of a vulnerability assessment
  • Network Penetration Testing
  • Reduction of false positives through exploitation
  • Exploitation via Metasploit for an effective penetration test
  • Using Meterpreter for pillaging and pivoting
  • Effective use of Netcat for network communication
  • Password and Authentication Exploitation
  • Effective password guessing techniques
  • Developing custom wordlists for effective password cracking
  • Exploiting weaknesses in common cryptographic password storage
  • Evaluating Windows and critical network infrastructure authentication weaknesses


  • Recon and Mapping
  • Identification of target web applications
  • Directory brute-forcing
  • Manual creations of web requests
  • Web application scanning and exploitation tools
  • Server-Side Web Application Attacks
  • SQL injection
  • Command injection
  • Directory traversal
  • Client-Side Web Application Attacks
  • Cross-site scripting
  • Cross-site request forgery
  • Cookie and session manipulation
  • Web Application Vulnerability Exploitation
  • Evaluating logic flaws in popular web applications
  • Leveraging public exploits against web application infrastructure


  • Anti-Virus Evasion Techniques
  • Manipulating exploits to bypass signature-based anti-virus tools
  • Leveraging packers and obfuscators
  • Altering tools to evade heuristic analysis engines
  • Advanced Network Pivoting Techniques
  • Protected network infrastructure tunneling with SSH
  • Remote proxy exploits with the proxychains tool
  • Host redirection with Meterpreter host routing
  • Exploiting Network Infrastructure Components
  • Routing infrastructure manipulation attacks
  • Manipulating hosts through network management interfaces


  • Locking Down Hosts
  • Securing DNS
  • Running split and split-split DNS
  • The problems with recursion and how to avoid them
  • How to avoid becoming a spam relay
  • Tools to test your DNS and SMTP setup
  • The importance of scrubbing banners
  • Locking Down Web Applications
  • Identifying application risks
  • CSRF attacks
  • Logical vulnerabilities
  • Session based weaknesses
  • Bypass attacks
  • How attackers use applications to target administrators
  • Injection exploitation
  • Securing web applications
  • Using a WAF to secure applications
  • Application Firewalls
  • Understand common web application attacks
  • Cross-site scripting
  • SQL injection and Blind SQL injection
  • What web application firewalls (WAFs) can and cannot protect against
  • What database firewalls can (and cannot) protect against
  • Deployment options
  • Evasion methods
  • Endpoint Protection
  • Application control
  • Whitelisting
  • Keeping all malware off of your systems
  • Taking control of USB drives
  • Bit9 and Carbon Black
  • Data Loss Prevention solutions
  • Advanced Malware Protection
  • Methods of evaluation
  • Sandboxing


Class is divided into teams and teams compete against each other using some of the following techniques
  • Target dossier creation
  • Nmap port scanner
  • Nessus vulnerability scanner
  • Network mapping
  • Netcat: File transfer, backdoors, and relays
  • More Metasploit
  • Exploitation using built in OS commands
  • Privilege escalation
  • Advanced pivoting techniques


A. Erlich


I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin


The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.

Top Related Courses

The Ransomware exercise is a customized, six-hour, live fire Cyber Range training exercise hosted on ACRE. This exercise is led by expert cyber security engineers and can be executed in a classroom as well as remotely. In this exercise, a ransomware-based attack (i.e., “WannaKry”) is launched via a malicious spear phishing originated compromise. This exercise includes a hands-on keyboard interface, which creates realistic technical training and management interaction opportunities. This exercise is not simulated – it is real malware, detonated in representative network enviroment. Participants are encouraged to view the attack as if it were happening to their institutions in real time, and asked to share what they have done or would do based on the facts provided. Such “range-based” exercises help institutions better understand the impact of an attack and prompt them to improve the ways in which their network defenders respond, communicate, request assistance, and recover from real-world cyber attacks. Institutions that have participated in this exercise have benefited directly by building greater interaction with their security community, as well as increasing capability maturity levels and resiliency across their specific customer sector.

All actions in war, regardless of the level, are based upon either taking the initiative or reacting in response to the opponent. By taking the initiative, we dictate the terms of the conflict and force the enemy to meet us on our terms. The initiative allows us to pursue some positive aim even if only to preempt an enemy initiative. It is through the initiative that we seek to impose our will on the enemy.

One major catalyst of change is the advancement of technology. As the hardware of war improves through technological development, so must the tactical, operational, and strategic usage adapt to its improved capabilities both to maximize our own capabilities and to counteract our enemy's. MCDP-1 Warfighting

For the first time in history, the cyber and warfare climate have intertwined. The blending of these two worlds has shown the importance of functional, practical and aggressive cybersecurity. UKI’s CyberVanguard Series Tier I: Enterprise Guardian focuses on enhancing foundational policies and best practices, with advanced fundamentals, empowering cybersecurity teams to protect their enterprise network.


© 2019 Ultimate Knowledge Insitute | All Rights Reserved
GSA# GS-35F-0469W