* All fees are exclusive of vat ** PREMIUM - Customize your learning experience
Our most popular information security and hacking training goes in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization. You leave with the ability to quantitatively assess and measure threats to information assets, and discover where your organization is most vulnerable to hacking in this network security training course.
What Do Participants Learn?
Understanding how perimeter defenses work and then be lead into scanning and attacking their own networks
Learn how Intruders escalate privileges and what steps can be taken to secure a system
Understanding and experience in Ethical Hacking
Learning about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
Who Should Attend?
IT Security Auditing
Technical IT Management
Those with the involvement of systems integration and corporate IT development. Financial controllers with a technical interest may also benefit from the training course.
What Will the Learning Experience Include?
Comprehensive pre-program activities include:
Web-based information forms & surveys completed by attendee.
Direct consultation with the attendee about the expectations.
During the training, participants engage in data, activities, and conversations that lead to insight and knowledge.
Participants learn from expert trainers who have both academic and business experiences.
Highly applicable training content & instructive activities for adding depth to training topics.
**A half-day site visit for integrating the experience & plan next steps. Opportunities to provide connections, ideas & support.
Explore & Practice
Apply & sustain the learning experience by using this ongoing support:
To ensure participant has new skills or behavior progress.
Optional, fee-based mentoring & coaching with the trainer.
Training materials & additional documents (e-books, pdf files, presentations and articles)
Evaluate your training experience by giving us feedbacks and help us to reach our organizational goals.
Penetration testing methodologies
Stealthy network recon
Passive traffic identification
Remote root vulnerability exploitation
Privilege escalation hacking
Remote access trojan hacking
Running shellcode in RAM vs. on disk
Breaking IP-based ACLs via spoofing
Abusing Windows Named Pipes for Domain Impersonation
Evidence removal and anti-forensics
Attacking network infrastructure devices
Hacking by brute-forcing remotely
Hiding exploit payloads in jpeg and gif image files
Hacking Web Applications
Breaking into databases with SQL Injection
Cross-Site Scripting hacking
Hacking into Cisco routers
Justifying a penetration test to management & customers