Description
A whirlwind tour of the most important tools and concepts for probing and protecting IT systems from hackers in a day
It can be difficult for IT professionals to keep abreast of the latest in network security. Why not therefore make it easier for yourself and let the experts lead you to the latest tools used in attacking and protecting networks from the hackers. This unique ethical hacking/penetration testing course will arm IT professionals with the necessary tools to penetrate and/or protect systems from harm. This course begins with the fundamental of proper planning, scoping and network reconnaissance. It then goes deeper into scanning, target exploitation, password attacks and wireless and web apps, with detailed hands-on labs throughout. It is a subset of the material used in the more comprehensive 3 day course. None the less, let us quickly get you up to speed on the latest in practical network security penetration testing.
The course is given by experts in network penetration. We start of with detailed reconnaissance by examining a target’s infrastructure and mining blogs, search engines, social networking sites and other Internet and intranet infrastructure. You will be equipped to scan target networks using best-of-breed tools. After scanning, you will learn dozens of methods for exploiting target systems to gain access and measure real business risk, then examine post-exploitation, password attacks and web apps, pivoting through the target environment to model the attacks of real-world bad guys. The aim is to provide an understanding of the theory of secure software and network systems through a series of lab based practical work and experiments. This treatment will reinforce software engineering best practice. This module also aims to introduce the key concepts of secure computer systems & provide expertise in applying the principal techniques in planning & deploying secure systems.
In a nutshell
This course provides an in-depth hands-on approach to attacking a modern computer system. This course will introduce the concepts and principles of secure systems in a day. In addition, students will be given the opportunity to learn how to configure and test application and network security, deploy secure network based software applications and resolve security problems. Students will have an in-depth knowledge of basic skills in hacking and protecting IT systems along with an appreciation for emerging themes that could impact secure systems in the future. All attendees will also receive a discount for the more comprehensive 3 day course if they want to deepen their skills after taking this 1 day course.
Syllabus
1. Linux & Pen Testing Environment Basics
2. Information Gathering Techniques
3. Port Scanning
4. Sniffing Traffic and Man in the Middle Attacks
5. Web Application Attack vectors
6. Web Application Testing
7. Password Attacks
8. Steganography