0845 450 6120

Hacking Insight for Managers

This 1 day course will introduce you to the basic technical concepts behind the various stages of a hacking attack, as well as some common tools used by hackers and security professionals alike. Examples are drawn from real-world breaches to show how lapses in security have resulted in high-profile damage to organisations and customers.

Assuming no prior information security knowledge, the course is ideally suited to anyone requiring a high-level understanding of techniques and current trends used in hacking without the need for practical know-how.

This is a multimedia theory-based course with group discussions. Should there be time and interest, there is also the opportunity to join a guided “hack lab”, in which you can try your hand at some simple web application attacks (Wi-Fi enabled device required).

Benefits:

This course illustrates the ways in which hackers operate, how they infiltrate organisations and the damage that can follow. We take an invaluable look at this through the eyes of an attacker. You will:

  • Gain an understanding of IT security from an attacker’s perspective
  • Be able to evaluate the possible risks to your business from hackers
  • Understand the principles of how to effectively defend your organisation from the risks of attack.

Target Audience:

  • Business Managers and those with a strategic responsibility for protecting a company’s IT systems & data
  • IT Managers, Systems Analysts,
  • IT Security Professionals & Auditors
  • Security Officers & Data Protection representatives
  • Those interested in understanding the risks that hackers pose to business.

Reset

Learning Objectives

What you will learn

  • A hacker’s mindset and motivations
  • The hacker methodology – insight into tools and tricks used
  • How an organisation is at risk from hackers
  • Various routes of attack eg Internet, employees, social engineering, emails, wireless
  • Details of some high profile attacks that have led to real damage, both financial and reputational.

Pre-Requisites

  • No prior information security knowledge
  • Basic computer literacy
  • It is recommended to read up on the concept of domain names and IP addresses, eg http://netforbeginners.about.com/od/i/f/ip_address.htm
  • Wi-Fi enabled device to join the "hack lab"

Course Content

  • Introduction – terminology, motivations, the lie of the land, methodology
  • Information gathering – from harvesting open-source information to social engineering
  • Target scanning, including port scanning
  • Vulnerability assessment, including the threat from client-side software
  • Exploitation, including attack pivoting
  • Privilege escalation, including password attacks
  • Retaining access, including botnets
  • Covering tracks
  • Team exercise – incident handling scenario
  • Web application attacks – threats, OWASP Top Ten
  • SQL injection
  • Conclusion – trends
  • Hack lab – practical attack scenarios
One Month
Two Months
Three Months
More than Three Months
PRINCE2 Foundation & Practitioner
MSP Foundation & Practitioner
APMP Certificate
ITIL Foundation
Scrum in One Day
Certified ScrumMaster
ISTQB Software Test Foundation
Microsoft Project
BCS Business Analysis Practice
Other - Please Specify Below

Online Courses

You may prefer an online course if you are looking for a flexible and cost-effective solution. Online courses allow you to study at your own pace, at a time that suits you.

We have the following eLearning options available:

Our Customers Include