Exploitation and Mitigation: HiveNightmare (CVE-2021-36934)

Cybrary
Course
Beta

Hive Nightmare (CVE-2021-36934) is a serious vulnerability that gives threat actors access to sensitive data in the Windows Registry. Don't get stung by Hive Nightmare. Get hands-on experience mitigating and exploiting this vulnerability in a secure lab environment by taking this course today.

Time
58 minutes
Difficulty
Intermediate
CEU/CPE
1
5.0
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course Content
Module 1: HiveNightmare Exploitation
HiveNightmare Introduction and Background
5m
Identifying the HiveNightmare Vulnerability
5m
Exploiting HiveNightmare (Lab)
20m
Application of Use for Penetration Testers and Red Teamers
2m
Module 2: HiveNightmare Mitigation

2.1HiveNightmare Root Cause and Mitigation (Lab)

25m

2.2HiveNightmare Summary

1m
Course Description

Who should take this course?

Our HiveNightmare course is designed for an intermediate-level learner, someone who is a seasoned offensive security professional, SOC analyst, or Windows system administrator who wants to know how to exploit and protect against the latest vulnerabilities impacting enterprise systems.

What are the prerequisites for this course?

You will gain the most benefit from this course if you have a functional understanding of Windows as an operating system, including core Windows security components like the SAM database, ACLs, and shadow copies stored on Windows.

Why should I take this course?

HiveNightmare (CVE-2021-36934) is a Windows elevation of privilege vulnerability that could allow a threat actor to acquire sensitive data from the Windows registry. Our course shows you how to exploit and mitigate this vulnerability in a secure lab environment, giving you the skills you need to protect your organization.

What makes this course different from other courses on similar topics?

This course specifically covers a critical vulnerability that could affect your organization. Matt Mullins is a seasoned professional within offensive security with over a decade of experience where he has worked in medical, financial, and government spaces. Matt has led multiple Red Team engagements, ranging from a few weeks to a year and covering multiple security domains. Outside of Red Teaming, Matt is also a seasoned penetration tester with interests in: AppSec, OSINT, Hardware, Wifi, Social Engineering, and Physical Security. Matt has a Master's degree in Information Assurance and an exhaustive number of certifications ranging from frameworks, management, and hands-on hacking. Matt is a Technical SME at Cybrary, focusing on Adversarial Emulation and Red Teaming for course content.

Why should I take this course on Cybrary and not somewhere else?

Our HiveNightmare course enables you to learn from one of the foremost experts in the field and ensures your readiness to recognize and mitigate this CVE. Defenders will know how to protect their organization against this vulnerability. Offensive teams will be able to exploit this vulnerability. Our on-demand format affords you the flexibility to learn at your own pace.

Instructed By
Matthew Mullins
Matthew Mullins
Technical Manager, Red Team
Instructor
Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a Exploitation and Mitigation: HiveNightmare (CVE-2021-36934) Certificate of Completion