Objectives
Understand how hackers can use the vulnerabilities of our infrastructure and information systems to achieve their goals.
Programme
- Introduction
- The basics of ethical hacking
- Objectives, practices and rules
- The strategies of the ethical hacker
- The preparatory phase
- Prepare an attack
- Hacker tools and techniques
- The enforceable phases
- Recognition: Finding a victim and detecting vulnerabilities
- Intrusion: Successfully enter the victim's computer
- Operation: Divert a system or retrieve data
- Finalisation: Remove the traces
- The terminal phase
- Exploit the product of the attack
- Reminder to the law
Method
Serious game, 20 challenges to solve together
Certificate
At the end of the training, the participants will receive a certificate of participation delivered by the House of Training.
Course material
The course material will be delivered at the beginning of the course.
Lieu
-
Security made in Lëtzebuerg (SMILE)16 bvd. d'Avranches Luxembourg
L-1160 Luxembourg
Luxembourg - Calculer l'itinéraire
Télécharger le planning PDF
4H
3H
mar. 18.06.2019 à 08h30
Introduction to ethical hacking
-
Security made in Lëtzebuerg (SMILE)
mar. 18.06.2019 à 13h30
Introduction to ethical hacking
-
Security made in Lëtzebuerg (SMILE)