Hands - on Hacking

'Hands-on black box, white box and grey box vulnerability testing’
Location Duration  
Amsterdam, April 7, 2014 5 days Request information  Register for this course
Lancelot Institute In- Company and Customized Training Services Request information
Partner with the Lancelot Institute Request information

This 5 day course equips participants with hands-on black box, white box and grey box vulnerability testing. It addresses testing of web applications, mobile applications, mobile devices, wireless security, host based and network based infrastructure. The course takes participants through all the stages of a professional penetration test from information gathering, target selection, vulnerability identification and exploitation to client interviews and the presentation of a professional vulnerability report. This training benefits IT- security managers, security consultants, engineers, penetration testers and IT auditors with a basic understanding of network devices, IP network services and operating systems. After attending this training they will:   

  • Have a solid understanding of the professional penetration testing model and the step by step approach of performing a professional vulnerability assessment  
  • Have gained practical and hands on experience in each of said stages [information gathering, target selection, vulnerability identification and exploitation, reporting of the vulnerability report]
  • Have hands on experience with black box, white box, grey box vulnerability testing  
  • Understand new trending topics such as RFID hacking, SAP/ Oracle penetration tests, Mobile Security, etc.
  • Understand leading practices such as OWASP
01. Introduction and security trends
02. Penetration testing methodology
03. External Infrastructure penetration test
• Information gathering (passive/active) • Detection and Exploitation • Firewall Security / Prevention Systems
04. Physical Security assessment and social engineering
05. Internal Penetration Testing
06. Application Assessments
07. Hacking & the trending topics
• Mobile Applications • Mobile Devices • RFID Hacking • SAP/ Oracle penetration testing
08. Putting it all together in a vulnerability assessment case
sluiten

Interested?



Name:  
Company:  
Position:  
E-mail:  
Address:  
Zip Code / City:  
Cell Phone:  
Country:  
 
Course:   Hands - on Hacking
Date & Location:  
Comments:  
sluiten

Tell a friend



Name:  
E-mail:  
Friend's name:  
Friend's email:  
sluiten

Book our experts for events, consultancy and congresses


 


Name:  
Company:  
Position:  
E-mail:  
Address:  
Zip Code / City:  
Cell Phone:  
Country:  
 
Interested in:   Additional information
Personal contact
Area of interest:  
Question/remark:  
Comments:  
sluiten

In house training at your location



Name:  
Company:  
Position:  
E-mail:  
Address:  
Zip Code / City:  
Cell Phone:  
Country:  
 
Interested in:   Additional information
Personal contact
Area of interest:  
Question/remark: