ABOUT THE PROGRAM
The course covers the following topics:
DON'T TOUCH THIS TAB
It’s important to improve the accordion’s behaviour
Hacking Concepts and Security Threats
- History of hacking
- What is ethical hacking
- Other types of hackers
- Attack lifecycle
- Attack types
Cryptography
- Overview
- Encryption types
- Symmetric/Asymmetric keys
- SSL/TLS
- Cracking Passcodes
Reconnaissance
- Overview
- Types and Goals
- Initial Recon
- Social networks
- Techniques
- Google hacking
- Countermeasures
Scanning Networks and Vulnerabilities
- Overview
- Understanding the 3-way handshake
- Checking for “live” systems and open ports
- Types of scanning
- Banner grabbing & OS fingerprinting
- Vulnerability Scanning & Drawing Out the Network
- Preparing Proxies & other Anonymizing Techniques
Sniffing
- Overview
- Types of Sniffing
- MAC Attacks
- ARP Poisoning
Enumeration
- Overview
- Techniques
- Defaults & NetBios
- LDAP
- SMTP
- DNS
- Countermeasures
System Hacking - Exploitations
- Gaining access
- Maintaining access
- Covering your tracks
Buffer Overflow
- Overview
- Inside buffer overflows
- Stack overflow
- Heap overflow
- Integer overflow
Malware Threats
- Overviews
- Trojans
- Viruses and worms
- Detecting malwares
- countermeasures
Hacking Web Servers
- Overview
- Web Servers vs Web applications
- Discovering Risks in Web Servers
- Web Server Misconfiguration
- Managing & Hardening Web Servers
- Other Attacks Against Web Servers
Hacking Web Applications
- Overview
- Understanding Web Application Security
- Reconnaissance & Footprinting
- OWASP & the Top 10 Web Application Security Risks
- Tampering of Untrusted Data
- Client-Side Attacks (XSS, CSRF)
- Sql Injection
- Defending Against SQL Injections
Hacking Wireless Networks
- Overview
- Wi-Fi Standards
- Wi-Fi Authentication Modes
- Encryption in Wireless
- Threats from Wireless
Social Engineering
- Overview
- Human Weaknesses
- Reconnaissance & OSINT
- Phishing Attacks
Denial of Service
- Understanding DoS Attacks
- Attack Techniques
- Tools & Services
- Defending Against Attacks
Don't touch this tab
ABOUT SOTERIA GLOBAL
SOTERIA Global is a global leader in cyber-security training solutions and services.
The cyber world is now a part of our everyday life. New technology emerges daily, and as opportunities increase, so do cyber risks. Threats constantly evolve, and we must protect our valuable assets.
A successful cyber defense has many factors, but they all have one thing in common: dedicated, skilled individuals.
SOTERIA Global experts develop our solutions and rely on the best technological assets in the market. Our impressive global presence expands over four continents, giving us access to the best cybersecurity professionals.
Our solutions range from customized training programs to developing cyber-oriented facilities, ensuring that individuals and organizations are ready to face real-world threats. Over the years, we have worked with various organizations across many sectors, giving us the skillset to shape and adapt our solutions to meet our client’s needs.
COURSE INFO
Target audience
- IT & Cyber professionals
- Employees
Prerequisites
- Good knowledge in networking
- Good knowledge in Windows and Linux
- Familiarity with the cyber-security domain an advantage
Skills Gained
- Network and endpoint scanning and exploiting
- Social engineering
- Attack planning and execution
- Enhancing knowledge of attack techniques and methods