Ethical Hacking v10 Module 1 - Introduction to Ethical Hacking
Training Course - Ethical Hacking
-
Upload
jayde-phoenix -
Category
Documents
-
view
33 -
download
3
Transcript of Training Course - Ethical Hacking
DATASHEET
© 2015 Foursys. All rights reserved DS-EHacking-0215
Ethical Hacking Training CourseA one-day training course designed to give you and your team the knowledge and
tools to be able to turn you into a white hat hacker to better secure your organisation.
DATASHEET
© 2015 Foursys. All rights reserved DS-EHacking-0215© 2015 Foursys. All rights reserved DS-EHacking-0215
If you are not satisfi ed, or if circumstances outside our control prevent the
services work being completed, then a Foursys engineer will return at no
extra charge to complete the work required or the cost of the work will be
refunded Foursys professional services and training courses are provided
by certifi ed engineers with practical experience in the products involved.
Head Offi ce
Manor Park, Great Barton,Bury St Edmunds, IP31 2QR, United Kingdom
www.foursys.co.uk
Main Switchboard
+44 (0)1284 788900
Technical Support
+44 (0)1284 788901
Contact usFoursys Professional Services Guarantee
Course OverviewOne of our experts will delve into the world of ethical hacking and teach you the techniques and tools that will turn you into a fully blown white hat hacker capable of securing your organisation from the latest targeted attacks by using the skills picked up in this intensive day of training.The instructor will guide you through the theory of how an attack is carried out, covering:
• Reconnaissance
• Scanning
• Gaining Access
• Maintaining Access
• Covering Tracks
Armed with this theoretical knowledge you’ll be shown how to carry out some of the most common attacks used by cyber criminals to exploit your organisation. These include;
• Identifying vulnerable machines
• Exploiting windows vulnerabilities
• Exploiting application vulnerabilities
• SQL Injection techniques
• Password Scanning
• Malware/Trojans
• Social Engineering
Our trainer will then discuss and advise on the range of preventative measures you can undertake to secure your network from these specifi c malicious attacks.This fascinating, educational and enjoyable course gives each delegate a laptop for the day, a course manual and all the tools to carry out these techniques to vulnerability test your own network on your return to the offi ce. The course can also be tailored to any specifi c threats or attacks you would like to focus on as long as suitable notice is given.
Experience RequiredThis is an introductory course to Ethical Hacking, so absolutely no previous experience of the subject is required. However, please note that it’s important you are familiar with computers and general networking/concepts to get the most from this course. Some basic Linux experience would be advantageous but is by no means essential.
Course LocationsFoursys holds regular scheduled training courses up and down the country, please check our website for upcoming courses. The course can also be held at your offi ces, price is available upon request.
Other Foursys Training Available
• Sophos Endpoint Training Course
• Websense Web Training Workshop
• Sophos UTM Training Workshop
Training workshops are not formal courses but are still designed to give users a thorough understanding of the product and typically involve use of customer’s existing installation.
Don’t just take our word for it
“I found the Ethical Hacking course extremely informati ve
and very useful... So much so that I booked a 4 delegate
in-house session!”Mike Conlon
Head of IT Infrastructure, South Warwickshire NHS Foundation
Trust