Are you a chief information security officer, security architect or a DevOps developer that would like to understand how cyber criminals are viewing your environment? Are you interested in finding out about the types of tools they’re likely to use to infiltrate your network? (Marketing Highlight)
Do you need to analyse penetration forensic tests to quickly discern the difference between critical and non-critical threats so you are better informed to take the right protective measures faster? (Marketing Highlight)
All trainings in the course are offered in English. The trainings are designed to include both theoretical and practical classes (labs). Attendees are provided with all required training materials. Upon completion of the course, all attendees will be able to pass certification program to validate their knowledge on the course subjects.
The course will give attendees the necessary skills to identify the type of attack, to find out an intruder’s footprints, to properly collect evidence to prosecute and to conduct deep analysis of computer information during an expertise. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you.
What will I learn?
While we will cover a wide range of security topics, it is not designed to teach everything. The aim is to provide you with enough baseline knowledge so you can continue learning more about ethical hacking.
The following topics are covered:
- Information Gathering
- Exploits & Buffer Overflows
- Local Privilege Escalation
- Password Attacks
- Client Side Attacks
- Pivoting & Tunneling
- Web Application Attacks
- Domain Privilege Escalation
- Wireless Attacks
- Computer Security Incident response team (CSIRT) management
- Computer forensics of Windows machines
- Computer forensics of Linux machines
- Computer forensics of Mac-OS machines
- Memory Forensics
- Network forensics
- Reverse Engineering
- Data Recovery
- Mobile Forensics
The course program is designed so that every new unit of information is accompanied by the practical work, that allows attendees to assimilate the new material better and gain the skills of its use in their labor activity. The detailed group analysis of the obtained solutions with the involvement of the teacher let attendees to bring out their mistakes and avoid these mistakes in the future.
At the final session, the participants have an opportunity to choose the real business case which maximally represents the specifics of their work, or to provide their own one, in agreement with the teacher.
What are the Prerequisites?
There are no prerequisites. However, you might not get the most out of the course unless you possess the following:
- Resilience against failure – In this course you will fail. A lot. And that’s a good thing. You learn the most when you fail. After all, hacking is just a long sequence of failures until you reach that one great success.
- A “Never give up” attitude – Some parts are intentionally hard and will require you to think differently and creatively. This is often a situation we experience in real world penetration tests.
- Being comfortable in a command line – Although not a strict requirement, a lot of work we do is in the command line (Linux specifically).
- Basic understanding of computer networking – Again, not a strict requirement but this course assumes you have baseline knowledge of IP and routing.
Isn’t Hacking Illegal? ( Marketing Highlight)
Hacking is illegal without prior permission from the system owner. As SpearHead Networks owns all the target systems, you will be given permission to conduct the hack exercise when you attend the course.
Think like a hacker so you can beat cyber criminals at their own game. Be better equipped to improve and safeguard your network against potential threats. Register for our unique and highly interactive course today.