Duração:
1 dia
Próxima Data:
21 Jul 2025
Local:
Online
Descrição
This 1-day course will teach you the foundations of Pen Testing and how to find and exploit vulnerabilities within different technologies. This introductory course will train attendees in understanding Pen Testing and provide background information on risks and vulnerabilities associated with different systems and provide insight to how the mindset of a hacker works. Delegates will also get access to an online course environment platform which will be used to practice the concepts taught during the course.
Once you have completed the course, you can take an optional exam with Check Point whenever it suits you, and become a Hacking 101 Check Point Certified Pen Testing Associate (CCPA).
*PVP por participante. A realização do curso nas datas apresentadas está sujeita a um quórum mínimo de inscrições.
Destinatários
- Network admins: understand how your environment could be attacked
- Developers: see how real cyber criminals might target your applications
- Students and graduates: improve your employability and enhance your CV
- Career changers: get a taste of what it’s like to work as a penetration tester
-
Área: Cybersecurity
-
Certificação Associada: Hacking 101 Check Point Certified Pen Testing Associate (CCPA)
Programa:
HACKING FUNDAMENTALS
- Hacking History 101
- Hacking today
- CIA Triad
- Art of Hacking methodology
- Introduction to Kali Linux
WINDOWS SECURITY
- Windows Fundamentals
- Windows Password Hashing
- Workgroups vs Domains
- Windows Authentication
- Windows Exploitation 101
- Client-Side attacks
- Case Study: WannaCry
HACKING CONTENT MANAGEMENT SYSTEM (CMS) SOFTWARE
- Introduction to Content Management Systems
- Enumerating CMS Platforms
- Hacking WordPress
- Joomla Exploitation
NETWORK SECURITY
- Network fundamentals
- MAC addressing and network addressing
- Introduction to port addressing
- Understanding the Open Systems Interconnection (OSI) layer and transmission control protocol/internet protocol (TCP/IP) model
- Domain Name System (DNS) attack surface
- TCP vs user datagram protocol (UDP)
- Network scanning
- Shodan
LINUX SECURITY
Lessons:
- Introduction to Linux
- Linux Filesystem Hierarchy
- Linux File Permissions
- Berkeley Rsh/Rlogin Services
- Network File System (NFS) Security
- Missing Security Patches
- Vulnerability Identification
- Case Study: Shellshock
- Introduction to Metasploit
WEB SECURITY
- HTTP Protocol Basics
- Understanding Web Application Attack Surface
- SQL Injection
- Case Study: TalkTalk SQLi
- Command Injection
- Cross-Site Scripting (XSS)
- Open Redirect
WIRELESS SECURITY
- WiFi Security 101
- Wired Equivalent Privacy (WEP)
- Wi-Fi Protected Access (WPA)
- WPA2 Security
- Wi-Fi Protected Setup (WPS) flaws
- Rogue Access Points Attacks
Pré-requisitos:
Delegates must have the following to make the most of the course:
- A genuine interest in cybersecurity and a desire to develop your skills
- Basic knowledge of common command line syntax
Partilha: