• Your selection is empty.

    Register the diplomas, courses or lessons of your choice.

Module 5: Intrusion on Windows systems

  • School / Prep

    ENSEIRB-MATMECA

Internal code

EC9IT315

Objectives

This module is part of the Activity A2 skills block: Technical security auditing

Task 1 (A2T1): Carry out technical security audits, including penetration tests, to assess the security of Web applications, operating systems (Linux, Windows) and network protocols.

- A2T1C1: Identify, analyze and document vulnerabilities in applications, systems and networks using specific tools.

- A2T1C2 : Perform penetration tests in a variety of environments (Web, Linux, Windows), in compliance with current standards and regulations.

- A2T1C3: Summarize the results of audits and penetration tests in a clear, detailed report, including recommendations for improving cybersecurity.

 

Task 2 (A2T2): Participate in the implementation and follow-up of corrective measures identified during technical safety audits.

- A2T2C1: Prioritize vulnerabilities and propose appropriate solutions in collaboration with technical teams.

- A2T2C2: Supervise the deployment of patches and ensure that systems comply with security standards.

- A2T2C3: Validate the effectiveness of corrective measures implemented and communicate results to stakeholders.

Task 3 (A2T3): Design and test simulated attack scenarios to assess system resilience under realistic conditions.

- A2T3C1: Develop realistic simulation scenarios based on attackers' tactics, techniques and procedures (TTPs).

- A2T3C2: Simulate attacks in a variety of environments and assess the defense capability of the digital infrastructure.

- A2T3C3: Document simulation results and provide strategic recommendations to improve system resilience.

 

Task 4 (A2T4): Develop and run cybersecurity training programs

- A2T4C1: Design teaching aids adapted to different audiences (end-users, technical teams, managers).

- A2T4C2: Run awareness-raising sessions and train employees.

- A2T4C3: Update training content by monitoring emerging threats.

Read more

Teaching hours

  • CIIntegrated Courses24h

Syllabus

  • Theoretical basis of Windows security elements (password storage, authentication protocols, name resolution protocols)
  • Local privilege elevation (user account bypass, information retrieval, compromise extension)
  • Elevation of privileges within a domain (Bouncing, Control Paths, extraction of authentication information, bypassing software restrictions)
  • Cross-domain privilege elevation
Read more

Target skills

  • Ability to identify and exploit Windows vulnerabilities.
  • Ability to make patching and remediation recommendations on Windows vulnerabilities.
  • Ability to carry out secure developments on Windows.
Read more

Assessment of knowledge

Initial assessment / Main session - Tests

Type of assessmentType of testDuration (in minutes)Number of testsTest coefficientEliminatory mark in the testRemarks
Continuous controlContinuous control1

Second chance / Catch-up session - Tests

Type of assessmentType of testDuration (in minutes)Number of testsTest coefficientEliminatory mark in the testRemarks
Final testOral301without document