Course
Cyber Security Tester – Hands-on Professional («HAK2»)
Course facts
- Apply the most important hacking tools and evaluate the threats they cause
- Testing your own security in test environments (hacking labs) thanks to your ethical hacking capabilities
- Inclusion of offensive findings in cyber security strategies
The course works with KALI LINUX™ and various extensions. For all participants a corresponding lab environment is available for the hands-on exercises. With these you will be introduced to the topic of practical ethical hacking and learn about the limits of various cyber security measures. With the knowledge you learn, you can then test the effectiveness of the cyber security measures in your own test environments. All participants expressly undertake not to misuse the knowledge they have learned. A written agreement must therefore be signed before the course start.
- Basics and Development of an Own Hacking Lab
- Useful Bash Commands in Linux
- Targeted Scouting / Footprinting / Bannergrabbing
- Network Sniffing Techniques (incl. passive WLAN scanning)
- Targeted Use of Network Scanning Techniques (Active and Passive)
- Perform Vulnerability Scanning
- Perform Various Man-in-the-Middle Attacks (ARP Poisoning, SSLStrip, ...)
- Perform Wireless Attacks (WEP, WPA2, WPS, DoS, ...)
- Understanding the Dangers of Evil Twin WLAN Attacks
- Introduction to MetasploitTM Framework (msfconsole, modules, payloads, auxiliary, ...)
- Exploit Selection for Various Client Side Attacks
- Perform Post Exploitation (additional modules, rights escalation, pivoting, fixing, ...)
- Understanding the Dangers of Antivirus and Firewall Evasion Techniques
- Advanced Threats Live Demo (HID and Bad USB Attacks)
* KALI LINUX™ is a trademark of Offensive Security.
* Metasploit™ is a tademark of Rapid7 LLC.
Component of the following courses
Security specialists, computer scientists and executives who have attended the Hacking Fundamentals Course (HAK) and would like to learn more about offensive ethical hacking techniques on the basis of hands-on training.
Completed Certified Ethical Hacker (CEH) course or basic knowledge of hacking as part of the following course as well as good TCP/IP knowledge are required:
This Hands-on course can be attended together with the Cyber Security Tester - Hands-on Foundation («HAK») course and the follow-up course Cyber Security Tester - Hands-on Advanced («HAK3») to prepare for various «Security Offense» certificates, such as the CompTIA PenTest+ certificate.
The OPST certification has been recognized for the «Master in Information Technology Security» diploma from La Salle University in Barcelona. This institution is part of the international La Salle educational network, which also includes Manhattan College in New York and La Salle University in Philadelphia. All OPST certificates carry both the ISECOM and La Salle seals, as a sign of the prestige that comes with them. Digicomp offers in addition exclusively for graduates of the HAK course series the three-day Bootcamp: OSSTMM Professional Security Tester (BPST) inclusive examination.
Participants must have a remote desktop client installed on their PC/notebook.
- Under Windows, the official Microsoft client is usually already installed
- macOS users can download the official Microsoft client from the Apple App Store: https://apps.apple.com/ch/app/microsoft-remote-desktop/id1295203466
Important: For security reasons, companies often block a remote desktop connection on business devices and in the company network. It is recommended to participate in the training on a private device and not on the company network. Alternatively, you can clarify in advance with the responsible IT department whether remote desktop connections are possible.