Menu

Ethical Hacker

Begrijp de denk- en werkwijze van een hacker - 5 maanden

Vakgebied

ICT

Opleidingsniveau

Training

Erkenning

NVAO geaccrediteerd

Meer informatie

Download brochure

Wil je dit met iemand delen?

Mail door

Incompany volgen?

Meer informatie

Fiscale scholingsaftrek

Meer informatie
Studieprogramma
Studieprogramma
Studieprogramma
Studieprogramma
Studieprogramma

Programma

De volgende onderwerpen komen aan bod:

IT Security Foundation Online

(0 bijeenkomsten)

  • Security in networks, systems and software
  • •TCP/IP Networking
  • •Computer Systems
  • •Applications & Databases
  • Assuring security through crypto and access control
  • •Cryptography
  • •Identity & Access Management
  • Common (ab)use cases
  • •Cloud Computing
  • •Exploiting Vulnerabilities

Ethical Hacking Foundation

(4 bijeenkomsten)

  • Introduction to Ethical Hacking
  • Network Hacking
  • The basics of wireless networking including BSSID and ESSID, open and closed networks and WPA/WEP security
  • Wireless network adapters and configuring the adapter to be used in WiFi hacking
  • Capture and crack a WEP key
  • Nmap and the zenmap GUI for network discovery scanning
  • Penetration I
  • Dirb and nikto and their primary differences and are able to interpret the initial results of a dirb and nikto scan
  • Launch a vulnerability scan with Vega and analyse/interpret results
  • Basic and special SQL commands
  • SQL Injection vulnerability
  • Execute an automated SQL Injection with SQLmap
  • Cracking a password hash with John The Ripper
  • Hydra to brute-force a web-based login form
  • Penetration II
  • Manipulating parameters in web-pages including GET and POST parameters
  • Client and server-side validation
  • OWASP ZAP and Burpsuite
  • ZAP/BURP to bypass client-side validation
  • ZAP/BURP with cookies
  • File inclusion
  • Gaining shell access
  • Capture the flag
  • Breaking into the wireless network of Bicsma
  • Discovering interesting hosts and identify what services run on them

Ethical Hacking Practitioner

(10 bijeenkomsten)

  • Introduction to Ethical Hacking Practitioner
  • Learning objectives:
  • Students understand the processes involved in performing a penetration test
  • Students can discern the different types of penetration tests
  • Students are able to report on a penetration test
  • Students are familiar with the basics of cyberspace law
  • Students are able to discuss the ethics of hacking
  • Reconnaissance and Intelligence Gathering
  • Learning objectives:
  • Students learn the ins and outs of intelligence gathering
  • Students gain insight into Open Source Intelligence (OSINT)
  • Students familiarise themselves with WHOIS and DNS enumeration
  • Students develop knowledge about Reconnaissance
  • Students develop basic knowledge about port scanning
  • Students gain insight into system and service identification and fingerprinting
  • Infrastructure Security Part I
  • Learning objectives:
  • Students learn the basics of TCP/IP
  • Students understand basic network protocols, such as DNS, DHCP, ARP
  • Students familiarise themselves with the workings of Wi-Fi and the ways it can be abused
  • Students understand the principle of port scanning and network mapping
  • Infrastructure Security Part II
  • Learning objectives:
  • Students understand what vulnerability scanning does and does not do
  • Students know how networking is made more secure with secure protocols, such as SSL/TLS and VPNs
  • Students understand how cryptography and Public Key Infrastructure work
  • Students understand what hashing is and how salts improve hashing strength
  • Students are able to do basic hash cracking
  • Web Applications I
  • Learning objectives:
  • Students acquire a basic understanding of web application architecture: front-end, application, database, server, etc.
  • Students develop a basic understanding of the HTTP protocol and its methods: GET, POST, etc.
  • Students familiarise themselves with OWASP
  • Students explore web application testing tools
  • Cross-Site Scripting
  • Authentication
  • Web Applications II
  • Learning objectives:
  • Students learn how to use HTTP in man-in-the-middle (MitM) proxies
  • Students gain insight into databases and SQL Injection attacks
  • Students learn about the benefits and dangers of web shells
  • Systems and Applications
  • Learning objectives:
  • Students know how to use Metasploit to exploit vulnerabilities and perform actions on a compromised system
  • Students know how to perform client-side attacks, such as file-type exploitation and drive-by downloads
  • Students familiarise themselves with pivoting / Lateral Movement
  • Exploiting Buffer Overflows
  • Students understand how buffer overflow exploits work
  • Students are able to find a simple buffer overflow (Use Fuzzing)
  • Students can create an exploit from a buffer overflow
  • Students gain an overview of countermeasures (DEP, ASLR)
  • Capture the Flag
  • Students demonstrate their skills in a lab environment
  • Using the knowledge acquired during the course, students discover hosts, identify services, access and, eventually, exploit services
  • The ultimate goal is to find a secret recipe

    Ethical Hacker

    Begrijp de denk- en werkwijze van een hacker - 5 maanden

    Vakgebied

    ICT

    Opleidingsniveau

    Training

    Erkenning

    NVAO geaccrediteerd

    Meer informatie

    Download brochure

    Wil je dit met iemand delen?

    Mail door

    Incompany volgen?

    Meer informatie

    Fiscale scholingsaftrek

    Meer informatie

    Heb je vragen?

    Onze deskundige opleidingadviseurs zijn telefonisch bereikbaar van maandag t/m donderdag van 08.00 tot 18.00, op vrijdag van 08.00 tot 17.00 en via WhatsApp op werkdagen tussen 10:00 en 16:00.
    Studiegids NCOI

    Vraag de studiegids aan

    Wil je nog beter worden in je werk? Doorgroeien naar een hogere functie? Of ben je toe aan een carrièreswitch? Als de grootste opleider van werkend Nederland bieden wij opleidingen op ieder niveau in vrijwel elke branche. Dankzij onze maximale flexibiliteit, praktijkgerichte opleidingen, topdocenten uit de praktijk en leslocaties door heel Nederland is er altijd wel een opleiding die bij jou en jouw situatie past. Vraag nu de gratis studiegids aan.

    Contact NCOI

    Opleidingsadvies op maat?

    Onze deskundige opleidingsadviseurs zijn telefonisch bereikbaar van maandag t/m donderdag van 08.00 tot 18.00, op vrijdag van 08.00 tot 17.00 en via WhatsApp op werkdagen tussen 10:00 en 16:00.