Cyber Attacks and Penetrations – Latest Hacking methodologies- Workshop

Cyber Attacks and Penetrations - Latest Hacking methodologies- Workshop

Main Speaker:


David Shiffman

Tracks:

After Event Workshops
cyber

Seminar Categories:

After Event Cyber
After Event Workshops
Cyber

Course ID:

50916

Date:

02/07/2024

Time:

Daily seminar
9:00-16:30

Location:

John Bryce, Tel Aviv

Overview

This course is designed to teach mid-level security practitioners how to engage all functional levels within the enterprise to deliver information system security. To this end, the course addresses a range of topics, each of which is vital to securing the modern enterprise.

Who Should Attend

  • Workers in IT industry
  • Workers in information security industry
  • Anyone who interested in information security industry

Prerequisites

  • Basic knowledge in PC environment

Course Contents

  • Buffer Overflows
  • Introduction to fuzzing
  • Introducing vulnserver
  • Fast-Track
  • Social Engineering Toolkit
  • Linux
  • Important directories and files
  • Important commands
  • Enumeration
  • Exploitation
  • Available tools on the remote system
  • Finding network information
  • Determine connections
  • Checking installed packages
  • Package repositories
  • Programs and services that run at startup
  • Searching for information
  • History files and logs
  • Users and credentials
  • Moving the files
  • Microsoft Windows post-exploitation
  • Important directories and files
  • Enumeration
  • Exploitation
  • Networking details
  • Finding installed software and tools
  • Pivoting

 



For More Information, Fill In The Details

Contact
Skip to content
Girl in a jacket