Hacking insight for managers
Course
In London
Description
-
Type
Course
-
Location
London
-
Duration
3 Days
this course is lecture-based using hacking simulations to illustrate potential threats and how they can be avoided. anecdotal references and case studies demonstrate the prevalence and profile of attacks. Suitable for: business managers & those with a strategic responsibility for protecting a company''''s it systems & data. it managers, systems analysts, it security professionals & auditors. security officers & data protection representatives. those interested in understanding the risks that hackers pose to business
Facilities
Location
Start date
Start date
About this course
this is a business focussed, management level course. a basic appreciation of it and the internet is desirable, but not essential.
Reviews
Course programme
this course is lecture-based using hacking simulations to illustrate potential threats and how they can be avoided. anecdotal references and case studies demonstrate the prevalence and profile of attacks.
course benefits
this course illustrates the ways in which hackers operate, how they infiltrate organisations and the damage that can follow. we take an invaluable look at this through the eyes of an attacker. you will:
- gain understanding of it security from an attacker''''s perspective
- be able to evaluate the possible risks to your business from hackers
- understand the principles of how to effectively defend your organisation from the risks of attack
delegates will:
- a hacker''''s mindset and motivations
- the hackers'''' methodology -insight into tools and tricks used
- how an organisation is at risk from hackers
- various routes of attack e.g. internet, employees, social engineering, wireless
- how to evaluate your business assets and what types of threats they face
- limitations of firewalls and how to overcome them
- techniques that every business should be aware of to mitigate and defend against attacks
- business managers & those with a strategic responsibility for protecting a company''''s it systems & data
- it managers, systems analysts, it security professionals & auditors,
- security officers & data protection representatives
- those interested in understanding the risks that hackers pose to business
this is a business focussed, management level course. a basic appreciation of it and the internet is desirable, but not essential.
course content
-
introduction to hacking
what is a hacker?
the motivations - why hack?
how hackers cause damage and the increased sophistication of attacks -
a business insight
the value of confidential information
case studies & examples
downtime, continuity, legal issues & costs
-
tools, techniques & methodology
hacking tools & technology
hacker genres
password cracking, trojan horses & back-doors
how effective attacks can be
-
information gathering
public records, information gathering & leakage
sweeping, scanning & detection
interrogating a service
-
vulnerability assessment
how hackers find areas of weakness, verify them and prepare to exploit them
-
exploitation of the target
types of exploitation common mechanisms used to exploit a target
-
privilege escalation
understanding, seeking & achieving greater levels of access to resources
-
covering tracks
techniques used by an attacker to hide their presence and retain access
-
mitigating the risks to business
the strengths & weaknesses of security solutions
how to effectively defend against hackers
-
introduction to hacking
what is a hacker?
the motivations - why hack?
how hackers cause damage and the increased sophistication of attacks -
a business insight
the value of confidential information
case studies & examples
downtime, continuity, legal issues & costs
-
tools, techniques & methodology
hacking tools & technology
hacker genres
password cracking, trojan horses & back-doors
how effective attacks can be
-
information gathering
public records, information gathering & leakage
sweeping, scanning & detection
interrogating a service
-
vulnerability assessment
how hackers find areas of weakness, verify them and prepare to exploit them
-
exploitation of the target
types of exploitation common mechanisms used to exploit a target
-
privilege escalation
understanding, seeking & achieving greater levels of access to resources
-
covering tracks
techniques used by an attacker to hide their presence and retain access
-
mitigating the risks to business
the strengths & weaknesses of security solutions
how to effectively defend against hackers
Hacking insight for managers