Course
digicode: HAK3
Cyber Security Tester – Hands-on Advanced
Course facts
- Incorporating your own creative ethical hacking approaches into the considerations
- Testing the effectiveness of advanced threat defences in your own organisation with ethical hacking skills (hacking labs)
- Incorporating offensive findings into cyber security strategies for well-protected environments
- Extension of the own Hacking-Labs from the course «Ethical-Hacking-Hands-on-Vieferung (HAK2)»
- Consolidation of the techniques learned in the HAK2 course with further hands-on labs
- Encourage your own creativity in ethical hacking with a targeted combination of hacking techniques
- Deepening of MitM techniques (e.g. HSTS bypass, code injection, keyloggers, DNA spoofing)
- Targeted advanced backdoor methods with evasion techniques using fake updates, manipulated files, embedding in programs, macros
- Achieving targeted system rights (bypass UAC techniques)
- Targeted methods for access security using persistence scripts
- PowerShell hacking methods and tools
- Browser Explotation (Hooking)
- Advanced knowledge with the Metasploit™ Framework (e.g. post-explotation, pass-the-hash, pivoting, targeted exploiting, combining with other attack vectors)
- Advanced WLAN hacking techniques (e.g. Rogue AP, Evil Twin)
- Skills extension with web hacking methods (e.g. website spoofing, XSS, SQLInjection)
- Advanced Threats Live-Demo (IoT-Hacking)
Component of the following courses
Security specialists, computer scientists and managers who have attended the course «Ethical-Hacking-Hands-on-Processing (HAK2)» and would like to deepen their knowledge in a hands-on training with Advanced-Ethical-Hacking techniques.
Attendance of the following courses or equivalent, broad hands-on hacking experience with KALI Linux, comparable to the courses listed below:
RDP info
Participants must have a remote desktop client installed on their PC/laptop.
- On Windows, the official Microsoft client is usually already installed.
- macOS users can download the official Microsoft client from the Apple App Store: https://apps.apple.com/ch/app/microsoft-remote-desktop/id1295203466
Important: For security reasons, companies often block remote desktop connections on business devices and within the company network. We recommend participating in the training on a private device and not on the company network. Alternatively, you can check with your IT department in advance to see if remote desktop connections are possible.