FL-HACK

Ladda ner som PDF

ANTI-HACKING Workshop (HACK)

This security training shows you hackers operate. With the experience gained in many hands-on exercises, you will be able to recognise and repel attacks, redress security vulnerabilities, and reduce security risks. The particulars of the given productive environment are taken into account.

Audience

Administrators and It security specialists who want to see security risks from the attacker’s perspective and use this insight to set up a solution scenario

Prior knowledge

  • Basic Windows/Linux system user and administrator skills and a fundamental understanding of the individual communication protocols (TCP/IP)
  • SQL programming skills are beneficial

Language

The course is taught in English (Contact us if you prefer Swedish).

Course Content

  • Who are these attackers? Their motivation and know-how
  • Design flaws in the TCP/IP protocol family
  • Sourcing information from publicly accessible databases
  • What are the known vulnerabilities of the software we use?
  • Scanning techniques under Windows
  • Active & passive fingerprinting
  • Assessing scan results and service-specific information
  • Buffers overflows (causes & functionality)
  • Tracing network intrusions step by step
  • Attacks against web applications & databases (SQL injection, cross-site scripting)
  • Using Linux Exploits (to obtain root rights)
  • Root kits and Trojans
  • Brute-force methods (cracking passwords)
  • Man-in-the-middle attacks
  • Analyzing one’s own system
  • Using intrusion detection systems
  • Protecting workstations, servers, and routers
  • Drafting security guidelines
  • Encoding

Course Content

  • Who are these attackers? Their motivation and know-how
  • Design flaws in the TCP/IP protocol family
  • Sourcing information from publicly accessible databases
  • What are the known vulnerabilities of the software we use?
  • Scanning techniques under Windows
  • Active & passive fingerprinting
  • Assessing scan results and service-specific information
  • Buffers overflows (causes & functionality)
  • Tracing network intrusions step by step
  • Attacks against web applications & databases (SQL injection, cross-site scripting)
  • Using Linux Exploits (to obtain root rights)
  • Root kits and Trojans
  • Brute-force methods (cracking passwords)
  • Man-in-the-middle attacks
  • Analyzing one’s own system
  • Using intrusion detection systems
  • Protecting workstations, servers, and routers
  • Drafting security guidelines
  • Encoding

Utbildningen levereras i samarbete med

Kurs-ID: FL-HACK
Längd: 5 dagar
Pris exkl moms: 25 900 kr

Frågor om kursen!?

Har du frågor om kursens innehåll, leveransdatum/ort eller behöver en företagsanpassad variant? Fyll i formuläret nedan!


Avtalsrabatter och kampanjer kan ej nyttjas på denna kurs.


Ort och datum

Stockholm
10 okt – 14 okt
Boka nu!

Tipsa