2
DATASHEET © 2015 Foursys. All rights reserved DS-EHacking-0215 Ethical Hacking Training Course A one-day training course designed to give you and your team the knowledge and tools to be able to turn you into a white hat hacker to better secure your organisation.

Training Course - Ethical Hacking

Embed Size (px)

Citation preview

DATASHEET

© 2015 Foursys. All rights reserved DS-EHacking-0215

Ethical Hacking Training CourseA one-day training course designed to give you and your team the knowledge and

tools to be able to turn you into a white hat hacker to better secure your organisation.

DATASHEET

© 2015 Foursys. All rights reserved DS-EHacking-0215© 2015 Foursys. All rights reserved DS-EHacking-0215

If you are not satisfi ed, or if circumstances outside our control prevent the

services work being completed, then a Foursys engineer will return at no

extra charge to complete the work required or the cost of the work will be

refunded Foursys professional services and training courses are provided

by certifi ed engineers with practical experience in the products involved.

Head Offi ce

Manor Park, Great Barton,Bury St Edmunds, IP31 2QR, United Kingdom

www.foursys.co.uk

Main Switchboard

+44 (0)1284 788900

Technical Support

+44 (0)1284 788901

Email

[email protected]

Contact usFoursys Professional Services Guarantee

Course OverviewOne of our experts will delve into the world of ethical hacking and teach you the techniques and tools that will turn you into a fully blown white hat hacker capable of securing your organisation from the latest targeted attacks by using the skills picked up in this intensive day of training.The instructor will guide you through the theory of how an attack is carried out, covering:

• Reconnaissance

• Scanning

• Gaining Access

• Maintaining Access

• Covering Tracks

Armed with this theoretical knowledge you’ll be shown how to carry out some of the most common attacks used by cyber criminals to exploit your organisation. These include;

• Identifying vulnerable machines

• Exploiting windows vulnerabilities

• Exploiting application vulnerabilities

• SQL Injection techniques

• Password Scanning

• Malware/Trojans

• Social Engineering

Our trainer will then discuss and advise on the range of preventative measures you can undertake to secure your network from these specifi c malicious attacks.This fascinating, educational and enjoyable course gives each delegate a laptop for the day, a course manual and all the tools to carry out these techniques to vulnerability test your own network on your return to the offi ce. The course can also be tailored to any specifi c threats or attacks you would like to focus on as long as suitable notice is given.

Experience RequiredThis is an introductory course to Ethical Hacking, so absolutely no previous experience of the subject is required. However, please note that it’s important you are familiar with computers and general networking/concepts to get the most from this course. Some basic Linux experience would be advantageous but is by no means essential.

Course LocationsFoursys holds regular scheduled training courses up and down the country, please check our website for upcoming courses. The course can also be held at your offi ces, price is available upon request.

Other Foursys Training Available

• Sophos Endpoint Training Course

• Websense Web Training Workshop

• Sophos UTM Training Workshop

Training workshops are not formal courses but are still designed to give users a thorough understanding of the product and typically involve use of customer’s existing installation.

Don’t just take our word for it

“I found the Ethical Hacking course extremely informati ve

and very useful... So much so that I booked a 4 delegate

in-house session!”Mike Conlon

Head of IT Infrastructure, South Warwickshire NHS Foundation

Trust