Enterprise Training
Learn advanced and powerful techniques to secure your MSSQL database environment and prevent attacks and unauthorized access!
The Power Behind Industry Leaders
About Training
The Advanced MSSQL Security Training is a corporate-level course designed to teach participants hands-on advanced exploitation techniques targeting MSSQL databases.
Throughout the training, which combines theoretical instruction with practical exercises, attendees will gain in-depth knowledge on advanced MSSQL exploitation methods, techniques for bypassing security controls, and strategies for advancing within compromised systems. The course aims to enhance both technical expertise and practical defense capabilities against cyberattacks.
Conducted online in a fully hands-on format, the training is scheduled on weekdays and completed within 3 days. Upon successful completion, participants receive a wet-signed Privia Security Certificate of Participation
Prerequisites for the Training
Participants are expected to possess certain foundational skills to ensure they can benefit fully from the training. These prerequisites have been defined to help attendees complete the course more effectively:
Basic knowledge of databases
Who Should Attend the Training?
Our corporate training program is designed for professionals seeking a hands-on learning experience in advanced MSSQL exploitation techniques.
Information security specialists
Database administrators
Network professionals
IT professionals aiming to conduct internal penetration testing
Experts planning to perform professional penetration tests
Curriculum
- 3 Sections
- 36 Lessons
- 3 Days
- Basic Database Security10
- 1.1MS-SQL Server 2016 Sample Lab Deployment
- 1.2MS-SQL Server 2016 Security and Roles
- 1.3MS-SQL Security Model
- 1.4Server-Level Security
- 1.5Basic Database Security
- 1.6MS-SQL Information Gathering Techniques
- 1.7Privilege and Permission Management
- 1.8Creating Custom Database Roles
- 1.9User Accounts
- 1.10Authorization and Access Control
- MSSQL Attack Techniques4
- Advanced Techniques22
- 3.1MS-SQL CLR Integration
- 3.2Custom CLR Development Samples
- 3.3Attack-Oriented CLR Module Development
- 3.4CLR-PowerShell Custom Code Execution
- 3.5Bypassing Security Products via CLR
- 3.6Creating and Executing In-Memory Malware
- 3.7Meterpreter Sessions
- 3.8Establishing a Meterpreter Session
- 3.9Custom Privilege Escalation Techniques
- 3.10Privilege Escalation from Meterpreter
- 3.11MS-SQL Relaying Techniques
- 3.12Understanding Relaying Attacks
- 3.13Network Scanning and Mapping
- 3.14Remote Code Execution on Other Systems
- 3.15Lateral Movement & Post-Exploitation
- 3.16WinRM (Windows Remote Management)
- 3.17Pass-the-Hash
- 3.18Over Pass-the-Hash
- 3.19Golden Ticket Attacks
- 3.20WMI (Windows Management Instrumentation)
- 3.21Port Forwarding Techniques
- 3.22Establishing Meterpreter Sessions on Other Systems


