Tällä kurssilla osallistuja pääsee tutustumaan tietoturvaan hyökkääjän näkökulmasta hands-on-tyylisesti.
Kurssilla testataan useita erilaisia työkaluja turvallisessa ympäristössä.
Koulutus ainoastaan lähiopetuksena!
Kesto: 2 päivää
Ajankohta: Toivo ajankohtaa, Helsinki
Hinta: 1900 €
"Hands-on Hacking Essentials" is an eye-opening course for IT & system administrators and security practitioners
Target audience: System administrators, information security specialists and -managers and any other IT personnel that is not afraid of the shell or command prompt
Trainers will engage participants with lectures, live attack demonstrations and practical examples followed by individual hands-on exercise scenarios. Course is interactive, practical, and besides active participation also full of attack stories that help to change the perspective and understanding of real life security threats.
During the 2 day hands-on course experience the participants should form a good understanding of current attacker tool-set, attack types and methods. By experiencing the attacker mindset and point of view via hands-onexercises the participants not only will gain much higher appreciation for attack threats, but will be much more alert and better prepared for their own IT systems defence and security testing.
Ideology of this course
The main differences between hacking and penetration testing are the intent and (imposed) limitations. Therefore, the idea behind this training is to see practical information security from the attacker's or "opposing team's" point of view and to deliver first-hand experience or running attacks.
Although this course is highly technical and extensively hands-on, all scenarios are built so that with the help of hints or even full HOWTO's from the scoring server, everyone can complete all exercises regardless of prior 1337 skills or experience level with various operating system.
Everyone will walk through the phases of an attack until successfully pWning various systems and services. There are plenty of attack scenarios to play through and to complete scored objectives. Since the expected participants' skill and experience level is varying to a large degree, we cover a mix of *nix and Windows world and focus on explaining key concepts and on showing the real attack even to those who have never compiled or launched any exploits before.
Karl Raik, Taavi Sonets and Mihkel Raba