7Safe CSTA Ethical Hacking Training

Introduction

7Safe CSTA Ethical Hacking Training

7Safe CSTA Ethical Hacking Training takes delegates on a practical journey through the various stages of a hacking attack, or equally a penetration test, from initial information discovery and target scanning through to exploitation, privilege escalation and retaining access. The course also explores the use of Trojans and Root kits, including the methods employed by modern malware such as that used against Google and others in the Operation Aurora attacks revealed in January 2010.

Duration: 4 days

7Safe CSTA Ethical Hacking TrainingRelated Courses

After completing this course, attendees will be able to:

  • How to use the tools, techniques and methodologies employed by hackers, in 7Safe’s purpose-built lab environment
  • How hackers collect information about an organisation prior to an attack
  • Measures to secure and protect information against hacker attacks

HACKING – AN INTRODUCTION

  • A history and cultural overview of hacking
  • Insights into the hacker mindset
  • Hacker genres

COMMUNICATION PROTOCOL BASICS

  • A review of TCP/IP networking
  • A review of ports and protocols
  • Sniffing and intercepting traffic
  • Man-in-the-middle attacks Limitations of firewalls
  • Tools to gain access to a system
  • How hackers assess weaknesses and subsequently launch attacks
  • How hackers conceal their tracks and how access to a target is maintained

Your Name*

Company*

Position*

Your Email*

Phone*

Address*

Number of Participants *

Time Frame*

Subject*

Your Message*