
Train On-Demand
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn More<br>In this course, you will learn about leveraging MS SQL Server, Exchange and Windows Update to gain an initial foothold, stealthily move laterally or spread the compromise into an organization’s network. You will be shown their inefficiencies and common misconfigurations as well as their powerful features and how they can be abused for exploitation or escalation.</br> <br>This course is part of the Advanced Penetration Testing Learning path which prepares you for the eCPTXv2 exam and certification</br>
Instructor for this course
Andres Doreste
Red Teaming MS SQL Server - Study Guide
Remotely Executing SQL Server Link Crawling and ARP Poisoning Through a VPN Tunnel
From SQL injection to DA hash
Red Teaming Exchange - Study Guide
SMB Relaying to EWS and Stealthily Backdooring Servers
Red Teaming WSUS - Study Guide
Stealthily Spreading the Compromise Through Windows Server Update Services
Serving a Malicious Update Through WSUS
Take your technical training into your own hands and stay engaged with our learn-by-doing platform where you can put your skills to the test with hands-on exercises, quizzes, and labs.
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn MoreINE quizzes, labs, projects, and exercises help reinforce your knowledge.
Learn MoreOrganized training helps guide you through the most relevant subjects for certification prep.
Learn MoreWe add new courses and learning materials to the platform weekly so you're always up-to-date.
Learn MoreIf you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?