One of our experts will delve into the world of ethical hacking and teach you some techniques and tools used by white hat hackers to help you better secure your organisation from the latest targeted attacks.
The intensive day course will discuss the theory behind attacks covering:
- Gaining Access
- Maintaining Access
- Covering Tracks
After which you’ll then get taught and carry out some of the most common attacks used by cyber criminals to exploit your organisation. The types of attacks you’ll learn are:
- Identifying vulnerable machines
- Exploiting windows vulnerabilities
- Exploiting application vulnerabilities
- SQL Injection techniques
- Password Scanning
- Social Engineering
Armed with this knowledge and understanding our trainer will then discuss and advise on the range of preventative measures you can undergo to secure your network from these specific malicious attacks.
This fascinating, educational and enjoyable course gives each delegate a laptop, a course manual and all the tools to carry out these techniques to vulnerability test your own network when you return. The course can also be tailored to any specific threats or attacks you’d like to focus on as long as suitable notice is given.
Please note that it’s important you’re familiar with computers and general networking/concepts to get the most from this course. Some basic Linux experience would be advantageous but by no means essential.
This course will credit delegates with eight CPD points each.