penetration testing course - hacking methodology

Transkrypt

penetration testing course - hacking methodology
Szkolenie Compendium CE
PENETRATION TESTING COURSE - HACKING METHODOLOGY
Strona 1 z 3
Szkolenie: Compendium CE
PENETRATION TESTING COURSE - HACKING METHODOLOGY
CENA
W celu przeprowadzenia kalkulacji ceny tego szkolenia prosimy o kontakt z działem handlowym
INFORMACJE DODATKOWE
Czas trwania szkolenia
Lokalizacje
3 dni
Kraków - ul. Tatarska 5, II piętro, godz. 9:00 - 16:00
Warszawa - ul. Bielska 17, godz. 9:00 - 16:00
OPIS SZKOLENIA
This three-day course has been developed to deliver a basic understanding on penetration testing methodology and techniques that
hackers can use. An instructor-led lecture mixed with hands-on practical application will be used to deliver an overview of the different
approaches to the subject of security audits and of the phases and tools involved in a regular penetration test project. Courses
provide training on penetration test practices, brief overall description of the tools used for the penetration testing attacks in terms of
their features and main goals, explain and demonstrate the latest technologies used for penetration tests along with both theoretical
and practical examples.Penetration Testing training is ideal for network administrators, security officers and crime prevention /
protection officers and is designed to educate for the purpose of properly defending systems from hacking attacks.
PLAN SZKOLENIA
- The Attacker
- Network Surveying
- Port Scanning
- System Identification / OS Fingerprinting
- Service Identification
- Sniffing
- Vulnerability Research and Verification
Compendium Centrum Edukacyjne sp. z o.o.
ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77
ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70
Bank BPH Spółka Akcyjna
Oddział w Krakowie
Numer konta: 74 1060 0076 0000 3210 0022 6028
Szkolenie Compendium CE
PENETRATION TESTING COURSE - HACKING METHODOLOGY
Strona 2 z 3
- Information Analysis and Attack planning
- Attack Types and Vulnerabilities
- Buffer overflows
- Mis-configurations
- Trust relationships
- Denial Of Services
- Other
- Attack / Privilege Escalation
- Exploiting vulnerabilities
- Privilege Escalation
- Communication channels
- Examples and tools
WYMAGANIA DLA UCZESTNIKA
To qualify for participation in this course, students must have:
Knowledge of IP, TCP, UDP and ICMP, and an understanding of network troubleshooting and technologies such as routers and
switches
Knowledge of Linux/Unix and Windows administrations
Knowledge of secure networking principles and design, corporate system security strategies and conceptual knowledge of firewalls
and intrusion detection systems.
CERTYFIKATY
The participants will obtain certificates signed by Compendium - Education Center.
Compendium Centrum Edukacyjne sp. z o.o.
ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77
ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70
Bank BPH Spółka Akcyjna
Oddział w Krakowie
Numer konta: 74 1060 0076 0000 3210 0022 6028
Szkolenie Compendium CE
PENETRATION TESTING COURSE - HACKING METHODOLOGY
Strona 3 z 3
PROWADZĄCY
Compendium's trainer
Compendium Centrum Edukacyjne sp. z o.o.
ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77
ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70
Bank BPH Spółka Akcyjna
Oddział w Krakowie
Numer konta: 74 1060 0076 0000 3210 0022 6028

Podobne dokumenty