penetration testing course - hacking methodology
Transkrypt
penetration testing course - hacking methodology
Szkolenie Compendium CE PENETRATION TESTING COURSE - HACKING METHODOLOGY Strona 1 z 3 Szkolenie: Compendium CE PENETRATION TESTING COURSE - HACKING METHODOLOGY CENA W celu przeprowadzenia kalkulacji ceny tego szkolenia prosimy o kontakt z działem handlowym INFORMACJE DODATKOWE Czas trwania szkolenia Lokalizacje 3 dni Kraków - ul. Tatarska 5, II piętro, godz. 9:00 - 16:00 Warszawa - ul. Bielska 17, godz. 9:00 - 16:00 OPIS SZKOLENIA This three-day course has been developed to deliver a basic understanding on penetration testing methodology and techniques that hackers can use. An instructor-led lecture mixed with hands-on practical application will be used to deliver an overview of the different approaches to the subject of security audits and of the phases and tools involved in a regular penetration test project. Courses provide training on penetration test practices, brief overall description of the tools used for the penetration testing attacks in terms of their features and main goals, explain and demonstrate the latest technologies used for penetration tests along with both theoretical and practical examples.Penetration Testing training is ideal for network administrators, security officers and crime prevention / protection officers and is designed to educate for the purpose of properly defending systems from hacking attacks. PLAN SZKOLENIA - The Attacker - Network Surveying - Port Scanning - System Identification / OS Fingerprinting - Service Identification - Sniffing - Vulnerability Research and Verification Compendium Centrum Edukacyjne sp. z o.o. ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77 ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70 Bank BPH Spółka Akcyjna Oddział w Krakowie Numer konta: 74 1060 0076 0000 3210 0022 6028 Szkolenie Compendium CE PENETRATION TESTING COURSE - HACKING METHODOLOGY Strona 2 z 3 - Information Analysis and Attack planning - Attack Types and Vulnerabilities - Buffer overflows - Mis-configurations - Trust relationships - Denial Of Services - Other - Attack / Privilege Escalation - Exploiting vulnerabilities - Privilege Escalation - Communication channels - Examples and tools WYMAGANIA DLA UCZESTNIKA To qualify for participation in this course, students must have: Knowledge of IP, TCP, UDP and ICMP, and an understanding of network troubleshooting and technologies such as routers and switches Knowledge of Linux/Unix and Windows administrations Knowledge of secure networking principles and design, corporate system security strategies and conceptual knowledge of firewalls and intrusion detection systems. CERTYFIKATY The participants will obtain certificates signed by Compendium - Education Center. Compendium Centrum Edukacyjne sp. z o.o. ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77 ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70 Bank BPH Spółka Akcyjna Oddział w Krakowie Numer konta: 74 1060 0076 0000 3210 0022 6028 Szkolenie Compendium CE PENETRATION TESTING COURSE - HACKING METHODOLOGY Strona 3 z 3 PROWADZĄCY Compendium's trainer Compendium Centrum Edukacyjne sp. z o.o. ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77 ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70 Bank BPH Spółka Akcyjna Oddział w Krakowie Numer konta: 74 1060 0076 0000 3210 0022 6028