Karlebovej 91, 3400 Hillerød | Krajbjergvej 3, 8541 Skødstrup
70 22 29 29
08:30 - 17:00

Security Hackathon: Fundamentals in Penetration Testing

Interesseret i dette kursus? Send os en forespørgsel.
Register your interest now

Kursusinfo

  • Dette kursus varer 3 dage
  • Der medfølger kursusmateriale til dette kursus
  • Dette kursus koster 4 klip på dit klippekort.
  • Fuld forplejning (Morgenmad, frokost, kage, kaffe og sodavand ad libitum)

Varighed

Dette kursus varer 3 dage

Materialer

Der medfølger kursusmateriale til dette kursus

Klip på klippekort

Dette kursus koster 4 klip på dit klippekort.

Forplejning

Fuld forplejning (Morgenmad, frokost, eftermiddagskage samt kaffe og sodavand ad libitum)

The only way to beat a hacker is thinking like one!

På dette kursus vil deltagerne tilegne sig viden ved at simulere et hackerangreb og evaluere sikkerheden for systemerne og netværksinfrastrukturen set fra et internt trusselsperspektiv.

Kurset vil være baseret på praktiske testcases, da et interessant labmiljø af sårbare virtuelle maskiner, værktøjer og teknikker vil blive sat til rådighed for deltagerne for på den måde at få en fuld hands-on oplevelse. Dette sikrer en grundig forståelse af de teoretiske begreber og giver samtidig deltageren hands-on erfaring.

Objectives

  • Learn how to attack a corporate infrastructure.
  • Understand and try some of the best attacks of last year, pass-the-hash and cypto vulnerabilities and rediscover how efficient old but good attacks like MitM and spoofing attacks work.
  • Understand why your first idea of protection does work and see the benefit of defence in depth.
  • Apply the methodology and techniques used by hackers to evaluate the security posture of the systems and exploit the weakest links.
  • Understand the different methods that intruders use to gain unauthorized access to systems and learn how to prevent them.

Course Content

The course will cover all the phases of a typical penetration test, following the methodology of:

  • Reconnaissance and information gathering
  • Footprinting and scanning
  • Vulnerability assessment
  • Exploitation
  • Post-exploitation

Capture the flag (CTF)

This session represents the culmination of the training course, where the students will apply the skills mastered in the course in a full-day, hands-on workshop. The students will conduct an actual penetration test of a sample target environment. FortConsult will provide the scope and rules of engagement, and the students will work in teams to achieve the goal of finding out whether the target organization/application is at risk.

Covered areas

  • Reconnaissance/mapping
  • Scanning
  • Exploitation
  • Post-Exploitation
  • Pivoting and Analyzing Results

The course will focus on attacking a Windows environment from the inside. Also we will shortly cover network devices and Linux.

The course is designed for IT professionals that fulfil the following minimum requirements:

  • Comfortable using Linux OS (you don’t need to be an expert)
  • Understanding of network protocols
  • Basic programming knowledge

Lignende kurser

Certified Ethical Hacker (CEH) 11 feb
Fundamentals in Windows Security Skriv dig op som interesseret til dette kursus
Introduction to Cyber Security Skriv dig op som interesseret til dette kursus
ESL-uddannelsen Skriv dig op som interesseret til dette kursus
Cloud Computing Security Skriv dig op som interesseret til dette kursus