How to look for gaps in corporate IT security? How to use malicious cyberattack vulnerabilities? And finally, how to analyse the way criminals think in order to avoid such an attack yourself? You will learn this from the first level of hacking training , where we approach the issue of cyberattacks practically. We will teach you how to analyse their course and neutralise them in the future, ensuring an effective protection of all devices in the ICT network.
First, you will learn Google Hacking techniques and how to obtain information about targets of attacks from the Internet. Next, you will learn and test tools supporting unit scanning in the ICT network and the opology created for the purposes of network attacks. With the knowledge of operating systems, ports and services already at your disposal, you can thoroughly monitor processes of hacking into systems of both workstations and servers. Then you will focus on pivoting techniques and a forwarding port. Finally, we discuss network security issues in practice based on examples of dozens of ways of attacking, tapping, and manipulating network traffic in wired and wireless networks.
21 h (3 days x 7 h)
2 November 2021 . - Katowice There are no vacancies
3 d x 7 h (Total 21 h)
Do you have any questions?
Do you need more information?
Do you want to pre-book the place?
+48 32 259 11 80