logo small

  • PROMO de Halloween!

    PROMO de Halloween!

    JUSQU'À 10% DE REMISE SUR UNE VASTE GAMME DE
    COURS EN LIGNE

    Jusqu'à 01/11/2020 inclus

    EN SAVOIR PLUS



SECO Institute Ethical Hacking Foundation offers an intensive hands-on introduction to ethical hacking. The course has been specifically designed for beginners with little or no programming experience. In Ethical Hacking Foundation, you will learn to hack by doing it in a risk-free virtual lab environment. You will understand how hackers think and work, and you will try your hand at various hacking techniques, including Wi-Fi hacking, web vulnerability scanning, SQL injection, password cracking and file inclusion. At the end of the course, you will use your newly acquired hacking skills to perform a basic black-box penetration test.

SECO INSTITUTE ETHICAL HACKING FOUNDATION EXAM FORMAT
  • Online via a certified proctor
  • 40 multiple choice questions
  • Duration of 60 minutes

Lieu

À distance

Accréditations

SECO-Institute

Prix par personne

950,00€

Date début du cours

12-11-2020

Date fin du cours

13-11-2020

Durée

2 jours

Langue

Anglais

Objectifs

  • Hack a WEP-protected Wi-Fi network;
  • Use basic network sniffing and port scanning techniques;
  • Use web application vulnerability scanners (Dirb, Nikto and Vega) to find potential vulnerabilities;
  • Interpret the results of a basic vulnerability scan;
  • Run an automated SQL injection attack using SQLmap;
  • Crack a password hash with John the Ripper;
  • Brute-force a web-based login form;
  • Bypass client-side validation;
  • Use basic local file inclusion and remote file inclusion techniques to gain shell access and be able to execute commands on the system;
  • Perform a basic black-box penetration test

Adressé à

This course ideally suits those new to the field of ethical hacking. Managers who want to gain insight into the possibilities and dangers of hacking are also welcome.

Contenus

Introduction to Ethical Hacking

  • Definition of ethical hacking
  • The hacking cycle
  • Kali Linux

Network Hacking

  • Wireless networking including BSSID and ESSID, open and closed networks and WPA/WEP security
  • Find information about a wireless network adapter and configure it to be used in WiFi hacking
  • Packet capturing using airodump and injection in order to capture and crack a WEP key
  • Using nmap and the zenmap GUI for network discovery scanning

Penetration I

  • Introduction to dirb and nikto and how to interpret the initial results of a dirb and nikto scan
  • Launch a vulnerability scan with Vega and analyse / interpret results
  • Basic SQL commands and know some more special SQL commands
  • How to find a SQL Injection vulnerability
  • How to execute an automated SQL Injection with SQLmap
  • Crack a password hash with John The Ripper
  • Using hydra to brute-force a web-based login form

Penetration II

  • Manipulating parameters in web-pages including GET and POST parameters
  • Students become familiar with client and server-side validation
  • OWASP ZAP and Burpsuite ar
  • Using ZAP/BURP to bypass client-side validation
  • Using ZAP/BURP with cookies
  • Understanding file inclusion
  • Working of local file inclusion
  • Working of remote file inclusion
  • Using these techniques to gain shell access

Capture the Flag

Using the techniques learned in the previous 3 modules, you’ll break into the wireless network of Bicsma (the fictional company that Security Academy has created and uses in its trainings). You’ll discover interesting hosts and identify what services run on them. Lastly you will access and eventually exploit these services to gain access to the systems

Prérequis

There are no formal prerequisites for this SECO Institute Ethical Hacking Foundation exam.

Langue enseignant

Anglais

Langue matériel cours

Anglais

Typologie d'examen

En ligne

Certification

S-EHF official certificate

Format certificat

En ligne

Langue examen

Anglais


SECO Institute Ethical Hacking Foundation cours à distance avec examen en Anglais à partir 12 novembre 2020 de 2 jours dispensé par iLEARN Innovative Learning

logo footer

iCONS - Innovative Consulting S.r.l.
Galleria J.F. Kennedy 10/A
20831 Seregno (MB) - Italy

0039 0362 330107
[email protected]

ISO 9001

Logo CSQ

2020 © iCONS - Innovative Consulting S.r.l.

iLEARN is a business unit of iCONS - Innovative Consulting Srl - VAT number 03334560962
iCONS - Innovative Consulting srl is certified ISO 9001 for training and consulting services.

Lean IT is a trademark of Lean IT Association LLC. DASA DevOps is a trademark of Agile Skills Association LLC 2018. BRMP® is a trademark of Business Relationship Management Institute, Inc. The Six Sigma logo is a Trade Mark of 6sigmastudy™ (a brand of VMEdu,Inc.). The SCRUMStudy logo is a Trade Mark of SCRUMStudy™ (a brand of VMEdu,Inc.). CAPM®, PMP®, PMI-ACP®, PMI-RMP® and PMI-PgMP® are Registered Trade Marks of PMI. AgileSHIFT®, ITIL®, PRINCE2®, PRINCE2 Agile®, P3O®, MSP®, MoP®, M_o_R® and MoV® are Registered Trade Marks of AXELOS Limited. The Swirl Logo™ are Trade Marks of AXELOS Limited. CCBA® and CBAP are registered certification marks owned by International Institute of Business Analysis™ (IIBA®). These certification marks are used with the express permission of International Institute of Business Analysis. TOGAF® and ArchiMate® are registered trademarks of The Open Group in the United States and other countries. COBIT® 5, CISA® and CISM® are Registered Trade Marks of the Information Systems Audit and Control Association and the IT Governance Institute. APMG-International™ AgilePM®, APMG-International™ ISO/IEC 20000, APMG-International™ ISO/IEC 27001, APMG-International™ Sourcing Governance, APMG-International™ Service Catalogue, APMG-International™ Change Analyst, APMG-International™ CMDB, APMG-International™ GDPR Awareness, APMG-International™ Praxis Framework, APMG-International™ Problem Analyst, APMG-International™ Change Management, APMG- International™ VeriSM and APMG-International™ Managing Benefits are Trade Marks of APM Group Limited.