Hacking insight: hands-on - general

Course

In London

£ 1,600 + VAT

Description

  • Type

    Course

  • Location

    London

  • Duration

    3 Days

this course is a hands-on journey into the hacking mindset, examining and practically applying the tools and techniques that hackers use. delivery is in an interactive format with the use of multi-media and practical hands-on workshops. open discussion is strongly encouraged. a 1 hour examination is held on the final day, assessing delegate understanding of the objectives. passing. Suitable for: those responsible for the security of it systems within an organisation, including but not limited to: systems / network administrators, auditors, security officers, it security professionals and those with an interest in this fascinating subject.

Facilities

Location

Start date

London
See map
210 Borough High St, SE1 1JX

Start date

On request

About this course

a basic understanding of tcp/ip and a background in microsoft windows and / or unix is essential.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

course description
this course is a hands-on journey into the hacking mindset, examining and practically applying the tools and techniques that hackers use. delivery is in an interactive format with the use of multi-media and practical hands-on workshops. open discussion is strongly encouraged. a 1 hour examination is held on the final day, assessing delegate understanding of the objectives. passing this examination (combined with satisfactory completion of practical workshops) will result in the certified security testing associate (csta) qualification being awarded.

course benefits
  • delegates will learn about the hacker mindset and become familiar with the tools used to attack systems.
  • our state-of-the-art class environment covers windows and unix operating systems and associated server software. *a wide range of hacking tools is featured.
  • the course is designed to educate for the purpose of properly defending systems from hacking attacks.

course objectives
delegates will learn:
  • how to use the tools, techniques and methodologies employed by hackers in a purpose-built lab environment
  • how hackers can accurately collect and assimilate information about an organisation''''s infrastructure whilst avoiding detection
  • how information may be used to assess weaknesses and subsequently launch an attack against a target
  • typical techniques used to gain or force access into a system
  • the types of tools used to leverage access on a system
  • how hackers conceal their tracks and the route through which access to a target may be maintained
  • limitations of firewalls and the tools used to bypass them
  • how hackers bypass intrusion detection systems (ids)
  • measures to secure and protect information against hacker attacks

audience
those responsible for the security of it systems within an organisation, including but not limited to: systems / network administrators, auditors, security officers, it security professionals and those with an interest in this fascinating subject.

pre-requisites
a basic understanding of tcp/ip and a background in microsoft windows and / or unix is essential.

course content
  • hacking - an introduction
    a background into hacking
    hacker genres
    overview of several high profile attacks
  • risks to business
    impacts to business and reputation
    operational and financial risks
  • a background to tcp/ip
    a descriptive overview of tcp/ip & networking
    spoofing & session hijacking
    denial of service (dos)
  • methodology overview
    the anatomy of a typical attack
  • tools & techniques
    types of tools and techniques employed by hackers
  • information discovery
    how information about a target may be discretely gathered
  • target scanning & system detection
    examining the target landscape
    sophisticated scanning types including operating system detection
  • vulnerability assessment
    how attackers probe & test for weakness
    the use of ''''firewalking'''' to map out access controls
  • exploitation & privilege escalation
    how access may be gained & privilege escalated to achieve full control
    of windows and unix systems
  • trojans, back-doors & root kits
    practical hands-on use of ''''trojan horses'''' & ''''back doors''''
    working with root kits to hide the presence of a hacker at the
    application and kernel level
  • firewall & ids evasion
    how attacks may traverse a firewall
    the role of intrusion detection & how it may be evaded using advanced
    techniques
  • hacking prevention
    security policy, system integrity, hardening & monitoring
    security tools, vulnerability assessment & penetration testing

Hacking insight: hands-on - general

£ 1,600 + VAT