Course
digicode: HAK
Cyber Security Tester – Hands-on Foundation
Course facts
- Understanding rudimentary hacking techniques and procedures
- Explaining the principles of ethical hacking
- Knowing the security issues of servers and client systems
- Detecting and preventing major Internet threats
- Knowing the limits of measures taken, such as antivirus and firewall systems
- Applying concrete hacking tools in the hacking lab
- Introduction to security issues and the Hacking-LAB
- Hackers’ working methods, techniques and tools
- Procedure of a targeted hacker attack
- Open Source Intelligence and Social Engineering
- Network sniffing, scanning and spoofing
- Intercept passwords and crack passwords
- Use cloaked malware and targeted exploits
- Secure access with a backdoor
- General defensive measures of the scenarios shown in the Hacking-LAB
Component of the following courses
Computer misuse is a threat that poses a serious threat to IT networks. In order to secure your own network, you need sound basic knowledge in the field of security auditing. By means of a hacker attack carried out in the LAB together with the appropriate tools, you will learn the procedures step by step.
Computer scientists and managers who want to gain an overview of the current security standards and check their ICT security configuration. This course serves as preparation for all interested participants for the «Certified Ethical Hacking» certification from EC-Council.
TCP/IP knowledge as covered in this course is recommended:
This compact seminar serves as preparation for the «Certified Ethical Hacker» – the international certificate of EC-Council. It certifies your anti-hacking abilities. Digicomp offers the five-day preparation seminar Certified Ethical Hacker (CEH).
RDP info
Participants must have a remote desktop client installed on their PC/laptop.
- On Windows, the official Microsoft client is usually already installed.
- macOS users can download the official Microsoft client from the Apple App Store: https://apps.apple.com/ch/app/microsoft-remote-desktop/id1295203466
Important: For security reasons, companies often block remote desktop connections on business devices and within the company network. We recommend participating in the training on a private device and not on the company network. Alternatively, you can check with your IT department in advance to see if remote desktop connections are possible.