Computer hacking is the practice of influencing computer hardware and software to accomplish a goal outside of their original purpose. A computer hacker is a person who identifies weaknesses and exploits them. Hacking is considered a complex activity. This course will explore the world of hacking and shed a light on how hackers work.
Course Objectives
This practical five-day course equips participants with hands-on black box, white box and grey box vulnerability testing. We will address testing of web applications, mobile applications, mobile devices, wireless security, host based and network based infrastructure.
The course takes the participants through the different stages of our proven methodology of information gathering, target selection and vulnerability identification and exploitation. Besides the methodology we will also discuss the different leading practices, such as OWASP and go into the different tools for vulnerability testing.
Target Group
Participants of the course are expected to have a basic understanding of network, TCP/IP and Operating Systems (Windows and Linux).
Day 2
Day 3
Day 4
Day 5