ethical hacking course hands-on hacking unlimited · this intensive two-day seminar is an...

2
zone-h.org - sec-lab.com CYBER SECURITY ACADEMY There are many ways to counter today’s Cyber Security challenges. Knowing the hacking mindset is the most important of these. How, in other words, a hacker thinks, behaves and acts - what techniques and methodologies are used by the hacker to take advantage of current existing vulnerabilities. With this is mind, Hands-on Hacking Unlimited has been created for IT professionals, security ocers, network administrators and others who wish to understand what really happens whenever an attack is perpetrated and which vulnerabilities are exploited by hackers. Hands-on Hacking Unlimited oers an eective and complete perspective with a focus on network vulnerabilities and an in-depth analysis of the most critical vulnerabilities, targets and concerns. HANDS-ON HACKING UNLIMITED Ethical Hacking Course

Upload: phamcong

Post on 30-Apr-2019

223 views

Category:

Documents


0 download

TRANSCRIPT

zone-h.org - sec-lab.com

CYBER SECURITYACADEMY

There are many ways to counter today’s Cyber Security challenges. Knowing the hacking mindset isthemost important of these. How, in other words, a hacker thinks, behaves and acts - what techniquesand methodologies are used by the hacker to take advantage of current existing vulnerabilities.

With this is mind, Hands-on Hacking Unlimited has been created for IT professionals, security officers,network administrators and others who wish to understand what really happens whenever an attack isperpetrated and which vulnerabilities are exploited by hackers.

Hands-on Hacking Unlimited offers an effective and complete perspective with a focus on networkvulnerabilities and an in-depth analysis of the most critical vulnerabilities, targets and concerns.

HANDS-ON HACKINGUNLIMITED

Ethical Hacking Course

This intensive two-day seminar is an introduction tothe base hacking techniques, hacking frameworks and tools.Below is the complete program:

Course Contents

> Introduction to Ethical Hacking

> Scanning HostsScanning for targetsScanning toolsFootprintingSniffingMITM attacksVulnerability scanners

> Information Gathering

> ExploitsClassificationExploits search and utilizationWhere to find themHow to choose themHow to use them Frameworks & tools

> PasswordMemory password dumpHashes dumpingPassword cracking techniques

> WiFiSniffing wireless networksWEPWPA/WPA2 WPSWiFi attacking tools

> Cover TracksProxyVPNTorDifferent tunneling techniques

How to think like a hacker to improve protection of your system.How to find and exploit discovered vulnerabilities.

Typical techniques used to gain access into a system.

What You Will Learn

Course Style: Live Hacking! Duration

Prerequisites Background in Microsoft Windows and Linux is desirable.

Knowledge of TCP/IP protocols.

About Zone-H

Basic hacking termsEthics in ethical hackingEthical workingPrivacy maintainingThe ethical hacker's arsenalThe phases of Penetration Testing

Different types of information gatheringInformation gathering toolsPassiveActiveSocial engineering

2 days.

Zone-H is an independent and open-source digitalobservatory, considered today as the most authoritativevoice on cybercrime of the Internet. The www.zone-h.orghomepage registers about 35.000 single accesses, for atotal of nearly 800.000 clicks, on an average day.

The data produced merge into one of the biggest digitalarchive in the world, including to date, over 12,000,000recorded and verified attacks, and providing informationon the attackers profiles, motivations and methodologiesof intrusion.

Worldwide educational programs focusing on thefundamental aspects of IT Security address a variegatedand international public, promoting “ethical hacking”techniques from a unique source of comprehensiveinformation and hacker intelligence.

sec-lab.com

www.zone-h.org