Learn the ethical hacking techniques commonly used to breech and exploit corporate networks and be able to identify how and when they are used. This course enables you to uncover vulnerabilities in operating systems, applications and IT networks and provides advice in applying appropriate countermeasures.
The Course educates participants on:
The methodology used to perform penetration testing.
How to compromise system security
How to utilise tools to exploit vulnerable systems
How to apply countermeasures to protect an organisation from exploitation.
How to spot and exploit weak physical controls that affect IT systems.
How to document your findings effectively to explain them to the business.
The Course teaches penetration testing techniques that quickly, efﬁciently and most importantly methodically uncover vulnerabilities in operating systems, applications and networks. Participants then learn how to use cutting edge exploit tools to take advantage of vulnerable systems and what countermeasures should be applied to protect systems from exploitation. This course focuses on Internet systems, Windows and UNIX system penetration and also covers other technologies including Wireless, Network Devices and VOIP.
This course focuses on Internet systems, Windows and UNIX system penetration and also covers other technologies including Wireless, Network Devices and VOIP.
Designed to combine theoretical teaching with practical application of the tools and methods learnt, it is expected that participants will be able to return to their workplace and immediately apply the tools and techniques learnt during The Course. To assist in the learning process, each participant is provided with a machine loaded with the software and tools to use throughout the course and, on successful completion of the week, are given a Linux Live CD of security testing tools.