Information and information system security is one of the most important topics today. In the era of more frequent and always different attacks, malware, ransomware, it's increasingly difficult to find the right way to defend. In order to determine the techniques and technologies needed for defending the organization, you need to know what is attacking you and how it attacks you. What hackers use, how they think and how they come to us are just some of the questions that are constantly being asked and the answer is difficult to find.
This training introduces you to all types of attacks and demonstrates the techniques and how ease is to perform them, with the goal of demystifying hacking and defying the mode of defennding.
Walt the attendies through all the steps of one attack, from zero point to complete control. Explain all techniques and demonstrate attacks and some of the most used tools. Defining and explaining defense techniques for each of the attacks, and parts of the attack.
Active Reconnaissance (PortScanning, Footprint, Vulnerability Scanning)
Network scanning and enumeration
Creation and distribution of Trojans, Viruses
DenialOf Service attacks
Post exploitation activities
Training is designed for everyone who wants to learn how hackers do some of the most common attack methods, how they create malicious software and how to do analisys of malware activities, and after all how to protect from it.
Prerequisits for attending the training:
Network infrastructure and operating system knowledge (elementary to advanced level)
Laptop that supports virtualization and has 4GB or more of RAM memory.