Hands-on Hacking Essentials is an eye-opening training for IT specialists, system administrators and security practitioners, a much needed “shock therapy” for most.
Training duration: 2 days of pure hacking and feeling ”1337”
Group size: 12 participants maximum
Trainers: rotates in trainings
The main differences between hacking and penetration testing are the intent and (imposed) limitations. Therefore, the idea behind this training is to see practical information security from the attacker’s or ”opposing teams’ point of view and to deliver first-hand experience or running attacks.
Although this training is highly technical and extensively hands-on, all scenarios are built so that with the help of hints or even full HOWTO’s from the scoring server, everyone can complete all exercises regardless of prior 1337 skills or experience level with various operating system.
Everyone will walk through the phases of an attack until successfully 0wning various systems and services. There are plenty of attack scenarios to play through and to complete scored objectives. Since the expected participants’ skill and experience level is varying to a large degree, we cover a mix of *nix and Windows world and focus on explaining key concepts and on showing real attacks even to those who have never compiled or launched any exploits before.
Trainers will engage participants with lectures, live attack demonstrations and practical examples followed by individual hands-on exercise scenarios. Training is interactive, practical, and besides active participation also full of attack stories that help to change the perspective and understanding of real life security threats.
Ilmoittautuminen ja aamukahvi
Essential attack phases, concepts attack vectors and tools
Ensimmäinen koulutuspäivä päättyy
Ilmoittautuminen ja aamukahvi
Putting it all together in one training scenario
„Network Takeover” scenario with Kali Linux and Armitage
Training scenario continues
Koulutus järjestetään Taitotalolla Helsingissä, osoitteessa Valimotie 8, 00380 Helsinki. Katso koulutuspaikan sijainti ja saapumisohjeet.
Etuhinta 29.9. asti
1 745 €
1 945 €
Hintaan lisätään alv 24 %. Hintaan sisältyvät sähköiset materiaalit, kahvit ja lounaat. Seminaarimaksun laskutamme ilmoittautumisen saatuamme.
Intended outcome: During the 2 day hands-on training experience the participants should form a good understanding of current attacker tool-set, attack types and methods. By experiencing the attacker mindset and point of view via hands-on exercises the participants not only will gain much higher appreciation for attack threats, but will be much more alert and better prepared for their own IT systems defense.
Taavi joined the team in April 2015 as a Web application pentester. His previous work experience consists mainly of Web Application development. He holds a M.Sc. degree in Cyber Security from Tallinn University of Technology. He wrote his masters thesis about improving User Simulation Team Workflow in the Context of Cyber Defense Exercise. Taavi is the main trainer of our Hands-on Hacking series courses: Essentials (HOHE), Follow-Up (HOHE-FU) and Advanced (HOHA) course.
Taavi also has Red Teaming leading experience (specialized in Client-Side attacks) since 2015.
James is a penetration tester with an extensive development background in software development. He joined the team in December 2016 and came from gaming sector, where as a Principal Developer, he worked on back end distributed systems.
James has a BSc degree in Software Engineering from De Montfort University, England. For his final year project, he wrote a steganography tool to invisibly embed large quantities of information into animated GIFs.
James is a trainer of our Hands-on Hacking Essentials (HOHE) course.
”Very profesional and clear presenter with a good sense of humour.”
”Professional, very well communicating and relaxed trainer. Thank you Taavi.”
”Very compact training. This two-day training equals some trainings that are even five days long and still you were able to get the information needed.”
”The training showed how easy hacking really is.”
”Comprehensive owerview about hacking.”
”The scenario that was used as an example was well planned and worked well for a beginner.”
System admins, information security specialists & -managers and any other IT personnel that is not afraid of the shell or command prompt.