Hacking insight for managers

Course

In London

£ 1,600 + VAT

Description

  • Type

    Course

  • Location

    London

  • Duration

    3 Days

this course is lecture-based using hacking simulations to illustrate potential threats and how they can be avoided. anecdotal references and case studies demonstrate the prevalence and profile of attacks. Suitable for: business managers & those with a strategic responsibility for protecting a company''''s it systems & data. it managers, systems analysts, it security professionals & auditors. security officers & data protection representatives. those interested in understanding the risks that hackers pose to business

Facilities

Location

Start date

London
See map
210 Borough High St, SE1 1JX

Start date

On request

About this course

this is a business focussed, management level course. a basic appreciation of it and the internet is desirable, but not essential.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

course description
this course is lecture-based using hacking simulations to illustrate potential threats and how they can be avoided. anecdotal references and case studies demonstrate the prevalence and profile of attacks.
course benefits
this course illustrates the ways in which hackers operate, how they infiltrate organisations and the damage that can follow. we take an invaluable look at this through the eyes of an attacker. you will:
  • gain understanding of it security from an attacker''''s perspective
  • be able to evaluate the possible risks to your business from hackers
  • understand the principles of how to effectively defend your organisation from the risks of attack
course objectives
delegates will:
  • a hacker''''s mindset and motivations
  • the hackers'''' methodology -insight into tools and tricks used
  • how an organisation is at risk from hackers
  • various routes of attack e.g. internet, employees, social engineering, wireless
  • how to evaluate your business assets and what types of threats they face
  • limitations of firewalls and how to overcome them
  • techniques that every business should be aware of to mitigate and defend against attacks
audience
  • business managers & those with a strategic responsibility for protecting a company''''s it systems & data
  • it managers, systems analysts, it security professionals & auditors,
  • security officers & data protection representatives
  • those interested in understanding the risks that hackers pose to business
pre-requisites
this is a business focussed, management level course. a basic appreciation of it and the internet is desirable, but not essential.
course content
  • introduction to hacking
    what is a hacker?
    the motivations - why hack?
    how hackers cause damage and the increased sophistication of attacks
  • a business insight
    the value of confidential information
    case studies & examples
    downtime, continuity, legal issues & costs
  • tools, techniques & methodology
    hacking tools & technology
    hacker genres
    password cracking, trojan horses & back-doors
    how effective attacks can be
  • information gathering
    public records, information gathering & leakage
    sweeping, scanning & detection
    interrogating a service
  • vulnerability assessment
    how hackers find areas of weakness, verify them and prepare to exploit them
  • exploitation of the target
    types of exploitation common mechanisms used to exploit a target
  • privilege escalation
    understanding, seeking & achieving greater levels of access to resources
  • covering tracks
    techniques used by an attacker to hide their presence and retain access
  • mitigating the risks to business
    the strengths & weaknesses of security solutions
    how to effectively defend against hackers
  • introduction to hacking
    what is a hacker?
    the motivations - why hack?
    how hackers cause damage and the increased sophistication of attacks
  • a business insight
    the value of confidential information
    case studies & examples
    downtime, continuity, legal issues & costs
  • tools, techniques & methodology
    hacking tools & technology
    hacker genres
    password cracking, trojan horses & back-doors
    how effective attacks can be
  • information gathering
    public records, information gathering & leakage
    sweeping, scanning & detection
    interrogating a service
  • vulnerability assessment
    how hackers find areas of weakness, verify them and prepare to exploit them
  • exploitation of the target
    types of exploitation common mechanisms used to exploit a target
  • privilege escalation
    understanding, seeking & achieving greater levels of access to resources

  • covering tracks
    techniques used by an attacker to hide their presence and retain access
  • mitigating the risks to business
    the strengths & weaknesses of security solutions
    how to effectively defend against hackers

Hacking insight for managers

£ 1,600 + VAT