Security Workshop
Safety Noobs
Safety pros
Hacking knowledge
Training Best
practice
Learn How to
Think Like Hacker
Understand their intentions and procedures, and learn what techniques hackers use by applying them in hacking lab.
Use the knowledge gained to test the security of your own systems by means of penetration tests and to protect yourself better against future attacks.
Hacking Agendas
Target Group
Hacking & Penetration Testing – Basics is aimed at IT professionals and specialists who want to get to know and understand hacker procedures, methods and techniques in order to check the security of their own systems and to better assess the effectiveness of their own defenses.
It provides IT forensics with the gaze of the offender’s goggles and thus the knowledge to make investigations more accurate and efficient.
What You’ll Learn
general advice on safety and safe development is given.
The second part builds on this and is specifically focused
on a particular topic.
In the general part you will learn, among others, the
following points:
management
moment: Web application: The OWASP Top Ten , HTML5 and security of web services
Safety Through Practical
know-how
In our 2-day “Penetration Testing & Ethical Hacking” security training, you will actively learn how to handle the tools, gather information, develop attack scenarios, and successfully attack a target system with hands-on labs on your own notebook in the isolated demo network.
This seminar is particularly suitable for security officers and security administrators as well as IT engineers and IT administrators who want to learn the practical example of “hands-on”, how Bad Guys act and what power lies behind these free tools and procedures.
Program and Requirements
The first day focuses on theory blocks on penetration testing and ethical hacking, security principles, attack software, information gathering, and vulnerability-finding strategies. On the second day, we continue to immerse ourselves in the hacking world with topics such as wireless attacks and web / SQL security and, in addition, explore the practical application. In closed systems we learn how attacks work and can be fended off.
For participation, only the interest in IT security and a laptop with 4 to 8GB of memory and 15GB of hard disk space are required. Operating system knowledge for Windows and Linux is an advantage, but not required. There are no programming or hacking experiences required.
Ethical Hacking Penetration
Testing Workshop Leader:
In our 2-day “Penetration Testing & Ethical Hacking” security training, you will actively learn how to handle the tools, gather information, develop attack scenarios, and successfully attack a target system with hands-on labs on your own notebook in the isolated demo network.
This seminar is particularly suitable for security officers and security administrators as well as IT engineers and IT administrators who want to learn the practical example of “hands-on”, how Bad Guys act and what power lies behind these free tools and procedures.