HEXID SNOW - Hacking Explained and Intrusion Detection (5d.)

Description

How to protect yourself in the post-Snowden era? Just say no to intrusion and breaches

According to Forrester at least 60% of enterprises will discover a breach of sensitive data this year. By 2018, Gartner predicts even the first cyber-murder through the remote hacking of a wireless medical device. In five days we teach you how to say no to hacking. We’ll explain different concepts (MiTM, Botnets, DDoS ...) and guide you through classic attack scenarios and tools. The course comes with extensive labs and a detailed handout, which is available in electronic format.

Participants who complete the course will receive a certificate of completion allowing them to gain Continuing Professional Credits (CPEs). Those credits can be submitted for GIAC or ISC2 certification renewal. The most well-known ISC2 certification is the CISSP certification (Certified Information Systems Security Professional).

If you are unfamiliar with Linux command line essentials and/or security concepts, it is advised to attend at least the "PIA Linux in a nutshell (1d.)" and/or one of our cyber security introduction security classes in order to benefit from the HEXID class.

Why you need hacking and Wi-Fi cracking training? Comment by Stijn Huyghe and An Coremans, both experts at the Proximus ICT Academy. Stijn Huyghe and An Coremans (video - EN)

Check out other customer testimonials why this training is a must for you. The testimonial of Antoine Levaque and Stany Bussels (all videos in EN).

Duration: 35.00 hour(s)
Price: 2950

Sessions

27/11/2017 
28/11/2017 
29/11/2017 
30/11/2017 
01/12/2017 

Location: Brussels
Course language: English

Details

Starting from scratch, we will provide you with an overview of all the “classic” attacks and concepts in a practical way. We will explore and demonstrate the armory of the pentester and cyber criminal on several platforms and introduce you in this fascinating world.

Topics
  • Introduction: defining security, sources of threats, life forms, hacktivism, …
  • Enumeration: attack life cycles, OSINT, Google Hacking, SCADA, WHOIS, RIPE, DNS, Bluetooth, …
  • Enumeration, system: banner grabbing, scanning services, tools, passive fingerprinting, stealth scanning, NAT enumeration, web application fingerprinting, …
  • Vulnerability scanning: CVE, NVD NIST, Nessus, NASL, Nexpose, OpenVAS, Kali, …
  • Audit: introduction and concept, penetration test concepts, Metasploit, CORE Impact, Fuzzing, exploit kits, …
  • Metasploit: introduction and MS08-067 example, drive-by-download attacks, JAVA attack, …
  • Sniffing: concepts: Wireshark, Iris, L2, switch jamming, wifi, war dailing, …
  • Exploiting trust: SMTP, ARP, MAC, ICMP, Android, obfuscation techniques, phishing, fast flux networks, DNS cache poisoning, SSL, SSH, hijacking, …
  • Cracking: concepts and examples, web services, SNMP, SIP, MySQL, MiTM concepts, physical attacks, crypto attacks, …
  • Malware: concepts and demonstrations: virus, worm, backdoor, stealth, rootkit, Trojan, wireless, Android, …
  • Distributed Denial of Service (DDoS): concept, demonstrations, generation networks, BGP, amplification, botnets, …
  • Firewall: concepts and classic abuse.
  • Introduction to stack-based buffer overflow attacks (x86).
Prerequisites
  • a good, practical knowledge of TCP/IP and related protocols.
  • a good, practical knowledge of the Windows and *nix-based operating systems.
  • a good, practical knowledge of VMWare (or equal technologies).
  • knowledge of fundamental cryptographic concepts (symmetric, asymmetric, hashing, DH, …) and related protocols (SSL/TLS, SSH, PKI, …).

Contact

Our advisors are at your disposal. Choose your contact mode.