About this Event
Your course
This 1-day course teaches you how to apply basic security principles in your current role and can help you begin a career in cybersecurity. You’ll build a strong foundation of knowledge based on key industry principles, covering where hacking began to the modern techniques used by threat actors to target organizations and individuals today. Get your hands dirty with our popular virtual labs and learn from experienced, practicing penetration testers with a legacy of training at Black Hat.
Who’s it for?
- Network admins: understand how your environment could be attacked
- Developers: see how real cyber criminals might target your applications
- Students and graduates: improve your employability and enhance your CV
- Career changers: get a taste of what it’s like to work as a penetration tester
This course provides an introduction to offensive security by looking at the basic principles of application and infrastructure hacking. Sit in the seat of a pentester for the day, use the same tools and commands, and learn how cyberattacks work start to end.
Delegates must have the following to make the most of the course:
- A genuine interest in cybersecurity and a desire to develop your skills
- Basic knowledge of common command line syntax
Top 3 takeaways
- The 101 on how cyberattacks and security testing have evolved
- Exploitation techniques to target applications and different infrastructure environments
- Knowledge of the risks associated with different applications, systems, and technologies
What you’ll learn
This course uses a Defense by Offense methodology based on real world offensive research (not theory). That means everything we teach has been tried and tested on live environments and in our labs and can be applied once the course is over. By the end, you’ll know how to:
- Think and behave like a real-world threat actor
- Fingerprint, enumerate, and exploit common Windows and Linux misconfigurations and vulnerabilities
- Exploit common web application security flaws
- Differentiate between types of wireless standards and understand the benefits and associated risks
- Differentiate between different network topologies and addressing schemes
What you’ll be doing
You’ll be learning hands on:
- Spending most of the session (~80%) on lab-based exercises
- Exploiting a range of systems and environments
- Discussing case studies with your course leader to understand the real-world impact of the hacks covered
Why it’s relevant
Cybersecurity underpins everything. Whether you want to become a specialist or simply keep your skills relevant, now is an incredible time to do so. However, there’s a right way to start. As many seasoned security professionals will tell you, the stronger your baseline knowledge, the faster and better you’ll develop in the long-term. We believe the same, so our syllabus has been designed to equip you with the fundamentals needed to go on and specialize. Rather than focusing on novel and complex hacks that take years of experience and technical knowledge to master, we’ve selected some core themes and exercises to build your confidence and proficiency and prepare you for the next step. Delegates who go on to use these skills in the real world can return to take one of our Basic Hacking courses in around a year’s time.
Find out more about this course
Event Venue
Online
USD 450.00 to USD 600.00