Keywords:
Hacking, Cyber Security
Edu type:
Course or training
Location:
Den Haag, Online
Education:
Master (EQF 7)
Start date:
27/01/2025
Study Load:
40 hrs
Duration:
5 days
More information

Description:

Computer hacking is the practice of influencing computer hardware and software to accomplish a goal outside of their original purpose. A computer hacker is a person who identifies weaknesses and exploits them. Hacking is considered a complex activity. This course will explore the world of hacking and shed a light on how hackers work.

 

Course Objectives 

This practical five-day course equips participants with hands-on black box, white box and grey box vulnerability testing. We will address testing of web applications, mobile applications, mobile devices, wireless security, host based and network based infrastructure.

The course takes the participants through the different stages of our proven methodology of information gathering, target selection and vulnerability identification and exploitation. Besides the methodology we will also discuss the different leading practices, such as OWASP and go into the different tools for vulnerability testing.  

  • Practical five-day course
  • Proven methodology of information gathering, target selection and vulnerability identification and exploitation
  • Discuss the different leading practices and go into the different tools for vulnerability testing

Target Group

  • Security managers
  • Application developers
  • IT professionals
  • IT auditors who have an interest in ‘Vulnerability Assessment’ and ’hacking’.

Participants of the course are expected to have a basic understanding of network, TCP/IP and Operating Systems (Windows and Linux).

 

Program

Day 1
  • Introduction & Security Trends
  • Penetration testing methodology
  • Firewall security / Prevention systems
  • External Infrastructure penetration test
  • Solving hands-on challenges on our portal

Day 2

  • Recap of day 1
  • Infrastructure security tests (External vs Internal)
  • Introduction to malware and demo
  • Cryptography
  • Password cracking
  • Solving hands-on challenges on our portal

Day 3

  • Recap of day 2
  • Application architecture
  • OWASP top 10
  • Denial of service
  • Solving hands-on challenges on our portal

Day 4

  • Recap of day 3
  • Introduction to Red Teaming
  • Tour at the CIC of Deloitte
  • Vulnerability management
  • Digital forensics
  • Solving hands-on challenges on our portal

Day 5

  • Recap of day 4
  • Vulnerability assessment execution of a complete test
  • Reporting and presentation of the results
  • Evaluation and closing