Course
Cyber Security Tester – Hands-on Foundation («HAK»)
Course facts
- Knowledge of the hackers rudimentary techniques and procedures
- Explain the principles of ethical hacking
- Knowing the security issues of servers and client systems
- Detect and prevent key Internet threats
- Knowing the limits of measures taken, such as antivirus and firewall systems
- Applying concrete hacking tools in the Hacking-LAB
Computer misuse is a threat that poses a serious threat to IT networks. In order to secure your own network, you need sound basic knowledge in the field of security auditing. By means of a hacker attack carried out in the LAB together with the appropriate tools, you will learn the procedures step by step.
- Introduction to security issues and the Hacking-LAB
- Hackers’ working methods, techniques and tools
- Procedure of a targeted hacker attack
- Open Source Intelligence and Social Engineering
- Network sniffing, scanning and spoofing
- Intercept passwords and crack passwords
- Use cloaked malware and targeted exploits
- Secure access with a backdoor
- General defensive measures of the scenarios shown in the Hacking-LAB
Component of the following courses
Computer scientists and managers who want to gain an overview of the current security standards and check their ICT security configuration. Also addressed are persons who are interested in obtaining «Certified Ethical Hacking» certification.
Experience as Internet user and good TCP/IP knowledge according to the following course:
This compact seminar serves as preparation for the «Certified Ethical Hacker» – the international certificate of EC-Council. It certifies your anti-hacking abilities. Digicomp offers the five-day preparation seminar Certified Ethical Hacker (CEH).
Participants must have a remote desktop client installed on their PC/notebook.
- Under Windows, the official Microsoft client is usually already installed
- macOS users can download the official Microsoft client from the Apple App Store: https://apps.apple.com/ch/app/microsoft-remote-desktop/id1295203466
Important: For security reasons, companies often block a remote desktop connection on business devices and in the company network. It is recommended to participate in the training on a private device and not on the company network. Alternatively, you can clarify in advance with the responsible IT department whether remote desktop connections are possible.