Introduction to ethical hacking

Learn how to ethically, and safely attack a computer system along with the basics of penetration testing and attack simulations.

Penetration testing and attack simulations are vital parts of securely developing, deploying and integrating computer systems. Learning how to safely and efficiently attack a computer system gives developers and integrators a chance to view their systems from a hacker’s perspective, and helps them better understand cyber security requirements.

Participants in this lecture and hands-on training will learn about common vulnerabilities and cyber attacks, basic cyber security concepts, along with ethics guidelines for security testing. They will also have a chance to try out common hacking tools in a safe and secure environment.

Topics covered in this training module include:

  • Introduction to ethical hacking
  • Dos and don’ts of ethical hacking
  • Basic cyber security concepts
  • Cryptography
  • Data input validation
  • Authentication and authorization mechanisms
  • Multi-layered security
  • Exploiting security vulnerabilities
  • Web and application hacking tools
  • Network hacking tools
Duration: Three days
Type: Lecture and hands-on training
Recommended group size: Up to 20 participants
Target audience:
  • Software developers
  • IT team members
Prerequisites: Basic knowledge – information systems
Want to learn more?
×

Learn more about ethical hacking


Thank you for contacting us

We look forward to speaking with you soon.


Error

Contact attempt failed.

Please try again, or write to: info@cyfenders.com


Error

Please try again, or write to: info@cyfenders.com


Thank you for joining our startup and small business cyber program

Error

Subscribe attempt failed.

Please try again, or write to: info@cyfenders.com