Hacking & Security: The Basics

Formations Hacking & Security: The Basics

OBJECTIF

This training is a first approach to the practices and methodologies used in intrusions into corporate networks. We focus on technical understanding and putting into practice the different forms of existing attacks. The goal is to provide you with the first basic technical skills necessary for conducting security audits (penetration tests), judging for yourself the criticality and the real impact of the vulnerabilities. discoveries on the SI.

In particular, the objectives of the training are as follows:

  • Understand and detect attacks on an IS.
  • Exploit and define the impact and scope of a vulnerability.
  • Correct the vulnerabilities.
  • Secure a network and integrate basic security tools.

PREREQUISITES

• Knowledge of Windows

GENERAL INFORMATION

• Code : HSF
• duration : 2 days
• schedule : 8h30 - 17h30
• place : training center, Center Urbain Nord

TARGETED AUDIENCE

  • • RSSI
  • • Engineers / Technicians
  • • System Administrators / Networks.
  • • Anyone interested in computer security.

RESOURCES

• Course materials
• 40% demonstration
• 40% of theory
• 20% practical exercises

PROGRAM OF TRAINING

  • Day 1
  • Introduction
  • • Definitions

    • objectives

    • Vocabulary...

  • Taking information
  • • Passive information capture (WHOIS,social networks, Google Hacking,Shodan, etc.)

    • Active information taking (traceroute,social engineering, etc.)

    • Vulnerabilities and exploits database

  • Network
  • • OSI and TCP / IP model reminders

    • Vocabulary

    • Protocoles ARP, IP, TCP etUDP

    • NAT

    • Port Scan

    • Sniffing

    • ARP Cache Poisoning

    • DoS / DDoS

  • Day 2
  • Local attacks
  • • Breakage of passwords

    • Privilege escalation

    • Attack of the GRUB

  • Social engineering
  • Use of human weaknesses to recover sensitive information and / or compromise systems (Phishing, Remote Control Tools)

  • Ranged attacks
  • • Introduction to Metasploit Framework

    • Vulnerability scanner

    • Attacks on a client workstation

    • Attacks from a server

    • Introduction to Web vulnerabilities

  • Secure yourself
  • • Updates

    • Default configurations and best practices

    • Introduction to cryptography

    • Presentation of steganography

    •Anonymity (TOR)

Do not hesitate to contact our experts for any additional information, study and free calculation of an audit service.