COURSE OBJECTIVE:
English:
Students will learn how to:
• Identify security profile of the target
• Perform the testing activities
• Figure out protection oportunities
• Optimize security controls to reduce risks
TARGET AUDIENCE:
Security Analysts, Risk Managers, Security Officers, System Managers, Architects, Penetration Testers.
COURSE PREREQUISITES:
• Sound knowledge of TCP/IP
• Operating systems architecture (Windows, Linux)
COURSE CONTENT:
Evolution of Hacking
• Operating System Services Security Overview
• Operating System Internal Security
• Databases Security
• Google Hacking
• HTTP Request Building
• Reconnaissance and Target Profiling
• Information Leakage and Error Handling
• Session Manipulation
• Tampering with Communication (Wired and Wireless)
• Exploiting a Lack of Access Controls
• Malicious Files Execution
• Legal Issues
Methods described in the training are demonstrated during live penetration tests and IT security audits. Our real live experience has allowed to work out the applicable testing methodology that requires a solid understanding of the security profile of the target. We are proud to say that this course is equally important for those who need to test, defend or perform a risk assessment of their infrastructure. Let us infect you with technology PASSION!
FOLLOW ON COURSES:
Not available. Please contact.