Home / Training / Hacking & Security: Fundamentals

Hacking & Security: Fundamentals

First practical approach to penetration testing and offensive security in the enterprise.

Objective

This training provides an introduction to the practices and methodologies used in corporate network intrusions. We emphasize understanding and practicing various forms of attacks. The goal is to equip you with the foundational technical skills needed to conduct security audits (penetration testing), and to assess the criticality and real impact of discovered vulnerabilities on the IT system.

Specific Objectives:

  • Understand and detect attacks on an IT system.
  • Exploit and determine the impact and scope of a vulnerability.
  • Remediate vulnerabilities.
  • Secure a network and integrate basic security tools.

Prerequisites

  • Knowledge of Windows

General Information

  • Code: HSF
  • Duration: 2 days
  • Schedule: 8:30 AM - 5:30 PM
  • Location: Training Center, Centre Urbain Nord, Tunis

Target Audience

  • Information Security Officers
  • Engineers / Technicians
  • System and Network Administrators
  • Anyone interested in computer security

Resources

  • Course materials
  • 40% demonstration
  • 40% theory
  • 20% practical exercises

Training Program

  • Day 1
    • Introduction
    • Definitions
    • Objectives
    • Vocabulary
    • Information Gathering
    • Passive Information Gathering (WHOIS, social media, Google Hacking, Shodan, etc.)
    • Active Information Gathering (traceroute, social engineering, etc.)
    • Vulnerability and Exploit Databases
    • Networking
    • OSI and TCP/IP Models Review
    • Vocabulary
    • ARP, IP, TCP, and UDP Protocols
    • NAT
    • Port Scanning
    • Network Sniffing
    • ARP Cache Poisoning
    • DoS / DDoS
  • Day 2
    • Local Attacks
    • Password Cracking
    • Privilege Escalation
    • GRUB Attack
    • Social Engineering
    • Exploiting Human Weaknesses to Obtain Sensitive Information and/or Compromise Systems (Phishing, Remote Control Tools)
    • Remote Attacks
    • Introduction to Metasploit Framework
    • Vulnerability Scanners
    • Attacking a Client Machine
    • Attacking a Server
    • Introduction to Web Vulnerabilities
    • Securing Systems
    • Updates
    • Default Configurations and Best Practices
    • Introduction to Cryptography
    • Steganography Overview
    • Anonymity (TOR)

Contact our experts for additional information, free audit studies, and cost estimates.

Information security is essential for any organization that needs to protect and enhance its information assets.

Contact Us