In-person training
Introduction to Hacking GamificationLearn Hacker Techniques
Staying up to date and learning hacking techniques is one of the best ways to know how to defend your organization from cyber-attacks. Hacking gamification is on the rise to help keep security professionals up to date on the latest exploits and vulnerabilities. This workshop is about helping you get started with hacking gamification to strengthen your security team whether it is about understanding hacker techniques, pentesting or incident response.
Malicious attackers look for the cheapest, fastest, stealthiest way to achieve their goals. Endpoints provide many opportunities to gain entry to IT environments and access to sensitive information.
The ethical hacking community has created numerous tools and techniques to help organisations better secure their Windows environments. In this training you will learn how to use many the tools used such as Metasploit framework, nmap, burpsuite and netcat which are just a few of the tools you will learn to use.
In this workshop, you’ll learn strategies and resources ethical hackers use at each stage of an ethical hack:
Armed with this knowledge, you’ll be able to try your hand at an ethical hack to test your own organization’s defenses. Most importantly, you’ll also learn endpoint security strategies that block malicious attackers from reaching their goals.
This half day workshop, Joseph Carson an Ethical Hacker with more than 25 years’ experience will choose up to five systems from Hack the Box and walk through each of them in detail explaining each step along with recommendations on how to reduce the risks. Going from initial enumeration, exploitation, abusing weak credentials to a full privileged compromise. Attendees have the option to completely follow along and practice their own skills at hacker techniques.
WHAT YOU WILL LEARN
- How to perform system and service enumeration on endpoints
- Discover vulnerabilities and modify exploit payloads to obtain initial access
- Perform Reverse Shells
- Basic Knowledge on how to use BurpSuite
- Create Payloads
- Privilege Escalation Techniques
WHAT YOU SHOULD BRING
- Your own laptop to use running either VMWare or VirtualBox to be used for Kali Linux
- More info below in pre-requisites
More info about training
DATE
24 May 2022 (In-person)
9:00 – 14:00 (5 hours including small breaks)
TARGET AUDIENCE:
- IT Security Professionals
- IT operations
- Incident Response Teams
- Beginner Pentesters
- Systems Administrators
- Infrastructure Management
- Workstation Management
- Professionals looking to move into security roles
PRE-REQUISITES:
- Your own Laptop that can run kali Linux
- Familiar with Linux however the trainer will help walk through each of the steps so only basic Linux knowledge is sufficient.
You can download Kali Linux from here, the best option is to choose a Virtual Machine either VMWare or VirtualBox https://www.kali.org/get-kali/
You can download VirtualBox from https://www.virtualbox.org/