Advanced Ethical Hacking Training Course - Bury St Edmunds
|Start||24 August 2017 - 9:00am||End||24 August 2017 - 5:00pm|
|Hosted by||Foursys||Cost||£750 + VAT|
|Location||Foursys HQ, Bury St Edmunds, IP31 2QR Show Map|
Add to Calendar24/08/2017 9:00am 24/08/2017 5:00pm Europe/London Advanced Ethical Hacking Training Course - Bury St Edmunds This one-day Advanced Ethical Hacking Course is designed to teach you and your team the more complex techniques employed by the most sophisticated hackers. Foursys HQ, Bury St Edmunds, IP31 2QR Foursys email@example.com DD/MM/YYYY
This one-day Advanced Ethical Hacking Course is designed to complement the Essential Ethical Hacking Course, and will appeal to those who have already completed it. By attending, you and your team will learn the more complex techniques employed by the most sophisticated hackers.
On this course, our instructor will take you deep into the technologies and techniques used by advanced hackers to crack passwords, evade anti-virus software, and carry out targeted exploits on Windows and Linux systems.
Topics covered on the course include the following:
- Responder NBNS/LLMNR spoofing (fishing for hashes/creds)
- Password cracking with Hashcat
- Anti-virus evasion
- Backdooring executables
- Utilising PowerShell Sneaky Sneaky
- Post exploitation with PowerShell Empire
- Linux smashing the stack (buffer overflow)
- Windows remote smashing the stack (buffer overflow)
The course will demonstrate and explain how hackers use the Responder tool for NBNS/LLMNR spoofing to capture and crack NetNTLM hashes over the network.
You’ll also learn how, once the hackers have gained access to your systems, they go on to steal more passwords and data - all whilst staying hidden - using ‘post-exploitation’ techniques and tools like PowerShell Empire.
Hands on Labs and Tutorials
During the course, our trainer will also run labs and tutorials for delegates to gain hands-on experience exploring:
- Password cracking using Hashcat: learn how hackers use CPU/GPU based password cracking tool Hashcat to crack passwords using captured hashes, WPA2 handshakes and other hashes.
- Methods for evading anti-virus systems: try out typical evasion methods including:
- Backdooring executables
- Using PowerShell via common attack vectors like macros.
- In-depth Linux and Windows buffer overflow tutorials: detailed tutorials on buffer overflows in Linux and Windows explaining how to control the flow of execution via local and remote vulnerabilities.
This Advanced Ethical Hacking course complements the introductory level Essential Ethical Hacking course, and delegates will ideally already have attended this course. Delegates should be familiar with computers, networking/concepts, Linux and/or Windows. It would be highly beneficial for delegates to have experience in programming.