Cyber Attacks and Penetrations - Latest Hacking methodologies- Workshop
Main Speaker:
David Shiffman
Tracks:
After Event Workshopscyber
Seminar Categories:
After Event CyberAfter Event Workshops
Cyber
Course ID:
50916Date:
02/07/2024Time:
Daily seminar9:00-16:30
Location:
John Bryce, Tel AvivOverview
This course is designed to teach mid-level security practitioners how to engage all functional levels within the enterprise to deliver information system security. To this end, the course addresses a range of topics, each of which is vital to securing the modern enterprise.
Who Should Attend
- Workers in IT industry
- Workers in information security industry
- Anyone who interested in information security industry
Prerequisites
- Basic knowledge in PC environment
Course Contents
- Buffer Overflows
- Introduction to fuzzing
- Introducing vulnserver
- Fast-Track
- Social Engineering Toolkit
- Linux
- Important directories and files
- Important commands
- Enumeration
- Exploitation
- Available tools on the remote system
- Finding network information
- Determine connections
- Checking installed packages
- Package repositories
- Programs and services that run at startup
- Searching for information
- History files and logs
- Users and credentials
- Moving the files
- Microsoft Windows post-exploitation
- Important directories and files
- Enumeration
- Exploitation
- Networking details
- Finding installed software and tools
- Pivoting