Loading...

ABACADEMY | TRAINING

Register to the training

Ethical Hacking Bootcamp

12/09/2018 - 13/09/2018 - 14/09/2018

Overview

This is a 3 day comprehensive technical awareness training for IT staff, system engineers, security officers, and enthusiasts. Definitely the most advanced, up-to-date security training ever organized, taught by trainers who perform security audits and penetration tests on an almost daily basis!

Students will attack servers, clients, wireless networks, mobile devices, and even humans!
They will create wordlists and crack passwords, generate malware, develop exploits, and detect/hack web vulnerabilities like SQL injection, XSS, CSRF, Heartbleed, DoS, etc.

Objectives

At the end of this training course, the students should be able to assess their own infrastructure for security holes, and to confirm false positives using penetration testing and ethical hacking techniques. In addition, they should be able to implement a defense-in-depth security solution.

We focus on methodologies and procedures, and not only on the software tools. This approach, in combination with our realistic hands-on labs, separates this course from others!

Availability

12/09/2018 - 13/09/2018 - 14/09/2018

Pricing

1500 EUR

Register here

Topics

Day 1 - Basics
Introduction to Kali Linux
Active and Passive Recon
Scanning and Enumeration
Vulnerability Mapping
Exploitation with Metasploit
Man-in-the-Middle Attacks
Pivoting and Post-Exploitation
Offline Password Cracking
Hacking Wireless Networks

Day 2 - Advanced
Advanced Password Attacks
Pass-the-Hash Techniques
Kerberos Token Impersonation
Extracting Windows Credentials
Hacking WPA/WPA2/WPS
Rogue Access Points
Device: the WiFi Pineapple
Anatomy of an Exploit
Hacking Windows 10/2012
Malware and Social Engineering
Client-Side Exploits (e.g. Flash)
Attacking Mobile Devices

Day 3 - Web Applications
Introduction to Web Applications
Pentesting and Methodologies
OWASP and the Top 10 Risks
Vulnerabilities and Exploitation
Post-Exploitation and Webshells
Local Privilege Escalations
Vulnerability Detection
Web Application Scanners
Intercepting Proxies
Web Server Hardening

Requirements

Own laptop is required (!)
Windows, Mac OS X, or Linux
Administrator privileges
Ethernet and USB interface
Ability to disable AV and IPS
VMware Player/Fusion installed

Basic knowledge in TCP/IP