25,000+ Courses Nationwide
0345 4506120

Hacking Insight for Managers

This 1 day course will introduce you to the basic technical concepts behind the various stages of a hacking attack, as well as some common tools used by hackers and security professionals alike. Examples are drawn from real-world breaches to show how lapses in security have resulted in high-profile damage to organisations and customers.

Assuming no prior information security knowledge, the course is ideally suited to anyone requiring a high-level understanding of techniques and current trends used in hacking without the need for practical know-how.

This is a multimedia theory-based course with group discussions. Should there be time and interest, there is also the opportunity to join a guided “hack lab”, in which you can try your hand at some simple web application attacks (Wi-Fi enabled device required).


This course illustrates the ways in which hackers operate, how they infiltrate organisations and the damage that can follow. We take an invaluable look at this through the eyes of an attacker. You will:

  • Gain an understanding of IT security from an attacker’s perspective
  • Be able to evaluate the possible risks to your business from hackers
  • Understand the principles of how to effectively defend your organisation from the risks of attack.

Target Audience:

  • Business Managers and those with a strategic responsibility for protecting a company’s IT systems & data
  • IT Managers, Systems Analysts,
  • IT Security Professionals & Auditors
  • Security Officers & Data Protection representatives
  • Those interested in understanding the risks that hackers pose to business.

Select specific date to see price, venue and full details.

Learning Objectives

What you will learn

  • A hacker’s mindset and motivations
  • The hacker methodology – insight into tools and tricks used
  • How an organisation is at risk from hackers
  • Various routes of attack eg Internet, employees, social engineering, emails, wireless
  • Details of some high profile attacks that have led to real damage, both financial and reputational.


  • No prior information security knowledge
  • Basic computer literacy
  • It is recommended to read up on the concept of domain names and IP addresses, eg http://netforbeginners.about.com/od/i/f/ip_address.htm
  • Wi-Fi enabled device to join the "hack lab"

Course Content

  • Introduction – terminology, motivations, the lie of the land, methodology
  • Information gathering – from harvesting open-source information to social engineering
  • Target scanning, including port scanning
  • Vulnerability assessment, including the threat from client-side software
  • Exploitation, including attack pivoting
  • Privilege escalation, including password attacks
  • Retaining access, including botnets
  • Covering tracks
  • Team exercise – incident handling scenario
  • Web application attacks – threats, OWASP Top Ten
  • SQL injection
  • Conclusion – trends
  • Hack lab – practical attack scenarios

Related Courses

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the requested service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.


We work with the best