Course Ethical Hacking Junior Expert | CYBER SECURITY duration Weekend
Summary of contents
In today's highly interconnected world, Information Security is an area of expertise that is acquiring more an more importance in business processes and in the world of work.
Ethical Hackers are the leading figures in this field: they master the same tools used by hackers and exploit the point of view of an attacker to deploy countermeasures able to protect their systems. This basic course, which is created as part of a broader training course in the field of Cyber Security, will give participants solid bases and allow them to specialize in more specific topics such as Penetration Testing or Digital Forensics.
The lectures will take place in a creative environment, where theory will go hand in hand with a substantial part of laboratory for practical sessions, with the aim of speeding up and facilitating the learning of some of the most complex issues. The laboratory environment offers participants a practical experience of the use of the main attack and security verification softwares. Students will acquire the basics of intrusion techniques and will reach a level where they can understand what specific measures can be taken to ensure an adequate level of security of the systems. The course is taught both in Italian and in English.
it will transfer to the participants basic technical knowledge in the fields of programming, networks, Unix systems, and create basic technical skills in the area of Cyber Security, aiming at providing the students with the appropriate technological tools for the distinctive module and for a subsequent specialist training in Ethical Hacking.
it will transfer the bases of technical knowledge specific to the world of Cyber Security, explore with the participants the main cyber attack techniques and the related countermeasures, and it will allow them to familiarize with the main software tools, to learn the methodologies and standards of Ethical Hacking commonly applied in the world of work.
The topics will include but are not limited to: ISO 27001/2 STANDARD, CODE OBFUSCATION, OWASP, ISECOM OSSTMM, COOKIES AND SESSIONS, SSL AND TLS, WEB VULNERABILITIES, MAIN TOOLS, PRACTICAL EXAMPLES AND LABORATORY, VULNERABILITY ASSESSMENT AND PENETRATION TESTING, PERIMETER DEFINITION, FOOTPRINTING AND SCANNING, VULNERABILITY IDENTIFICATION, REPORTING, MAIN TOOLS, PRACTICAL EXAMPLES AND LABORATORY.
Students will use Vmware Player and Virtualbox as virtualization systems and the ready-made Kali virtual machine.
Request an individual interview to learn the details of each unit.
- EXIN Ethical Hacking Certification (on-site examination)
- C|EH Certified Ethical Hacker (EC-Council)
Supplementary soft skills modules
Communication in the Digital Age
Effective Linkedin Profile
A basic knowledge in the use of computers and a keen curiosity for the world of information technology and security issues.
Equipment and Note
A practical preparation that will allow you to develop the necessary bases to operate in the field of Ethical Hacking and Information Security: you will gain practical experience on how to use of the main attack and security verification softwares; you will acquire the basics of intrusion techniques, as well as understand which specific measures can be taken to ensure an adequate level of system security.
Notebook: 64-bit dual core CPU | 8GB RAM | S.O. Windows, GNU/Linux or macOS
VirtualBox virtualization software
Kali Linux (Virtual Image OVF)
Note: Academic hours of 50 minutes.