Illegal hacking (i.e.; cracking computer systems) is a felony in the United States and most other countries. But when this type of hacking is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target.
An Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.About this workshop
This workshop will demonstrate to participants how to scan, test, hack and secure their own systems in an interactive environment. The lab intensive environment gives each participant in-depth knowledge and practical experience with the current essential security systems.
Participants will begin by understanding how perimeter defenses work and how trojans, virus and other malware behave and then they are taught how to scan and attack networks and applications.
They will then learn how intruders use SQL injection, escalate privileges and what steps can be taken to secure a system. They will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Penetration Testing.
This 40 hour highly interactive workshop will help participants have hands on understanding and experience in Ethical Hacking & Countermeasures.
Benefits
A proper understanding of ethical hacking is an important requirement to assess the integrity of the IT infrastructure.
Expertise in penetration testing & vulnerability assessment is an absolute requirement for a career in information security management and could be followed by management level certifications like CISA, CISSP, CISM, CRISC and ISO 27001.
There are many reasons to learn ethical hacking:
Therefore this workshop will prepare you to take the first step into the world of information security and give you a better understanding of various security concepts and practices that will be of valuable use to you and your organization.
Who should attend
This workshop will significantly benefit anyone who is concerned about the integrity of the network / IT infrastructure.
Anyone aspiring for a career in Ethical Hacking would benefit from this workshop. The workshop is restricted to participants who have adequate knowledge of networking and TCP/IP concepts.
Workshop Outline
The entire workshop is a combination of theory and hands-on sessions conducted in a dedicated ethical hacking lab environment.