0% found this document useful (0 votes)
34 views2 pages

Course Outline HIM

Uploaded by

av3r19dmw
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views2 pages

Course Outline HIM

Uploaded by

av3r19dmw
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

COURSE OUTLINE

ETHICAL HACKING
HT FOR
SIG M
IN

AN
H AC K I N G
Hacking Insight for

AG E R S
Managers (HIM) TH

G
E
ICA IN
L HACK

AWARNESS-LEVEL COURSE Cost: £650.00 + VAT Duration: 1 day

This one-day awareness COURSE OVERVIEW KEY BENEFITS


course is for people Assuming no prior information security On this course, you will:
knowledge, the course is ideally zzGain an understanding of IT security
who need a high-level suited to anyone requiring a high-level from an attacker’s perspective
understanding of hacking understanding of techniques and current zzBe able to evaluate the possible risks

rather than practical know- trends used in hacking without the need to your business from hackers
for practical know-how. Examples are zzUnderstand the principles of how to
how. It introduces the basic
drawn from real-world breaches to show defend your organisation effectively
technical concepts behind how lapses in security have resulted in from the risk of attack
the various stages of a high-profile damage to organisations
hacking attack, as well as and customers. WHO SHOULD ATTEND
Anyone interested in understanding the
some common tools This is a multimedia theory-based course risks that hackers pose, including:
used by hackers and with group discussions. Should there zzIT managers

security professionals. be time and interest, there is also the zzSystems analysts

opportunity to join a guided “hack lab”, zzIT security professionals and auditors

in which you can try your hand at some zzSecurity officers and data protection

simple web application attacks (Wi-Fi representatives


enabled device required).
For a course with more hands-on
technical content, delegates should
THE SKILLS YOU WILL LEARN consider our CSTA and CSTP courses.
zz You will gain an insight into the mind-
set and motivation of hackers, and PREREQUISITES
learn how they infiltrate organisations zzNo information security knowledge is
and the damage that can follow needed, just basic computer literacy
zzYou will find out how organisations zzWe recommend you read up on the

are exposed through the various concept of domain names and IP


routes of attack, including the internet, addresses before the course
employees, social engineering, emails zzBring with you a Wi-Fi enabled device

and wireless to join the ‘hack lab’ exercise (e.g.


zzYou will learn about the security lapses laptop or tablet)
behind a number of real-world, high-
profile attacks
zzYou will have the chance to try your

hand at some simple web application


attacks in our ‘hack lab’

To find out if our cyber training is right for you, or to make a booking,
call our education team on 01763 285 285 or email
[email protected]
COURSE OUTLINE

ETHICAL HACKING IN
SIG
HT FOR
M

AN
H AC K I N G
Hacking Insight

AG E R S
for Managers (HIM) TH

G
E
ICA IN
L HACK

AWARNESS-LEVEL COURSE Cost: £650.00 + VAT Duration: 1 day

“Excellent instruction; SYLLABUS


clear and concise 1. Introduction – terminology, 7. Retaining access, including
overview, perfect for motivations, the lie of the land, botnets
non-specialists.” methodology
HIM Delegate 8. Covering tracks
PA Consulting Group 2. Information gathering – from
harvesting open-source 9. Team exercise – incident handling
information to social engineering scenario

3. Target scanning, including port 10. Web application attacks – threats,


scanning OWASP Top Ten

4. Vulnerability assessment, 11. SQL injection


including the threat from client-
side software 12. Conclusion – trends

5. Exploitation, including attack 13. Hack lab – practical attack


pivoting scenarios

6. Privilege escalation, including


password attacks

PA Consulting
Global Innovation & Technology Centre Back
Lane, Melbourn
Herts, SG8 6DP, United Kingdom
tel: +44(0) 1763 285285
email: [email protected]
www: cybereducation.paconsulting.com

To find out if our cyber training is right for you, or to make a booking,
call our education team on 01763 285 285 or email
[email protected]

You might also like