Social Engineering and OSINT Workshop - $499Download PDF
Fundamentals of Open Source Intelligence
Overview of Open Source Intelligence (OSINT)
Describe where OSINT can be gathered
Understanding Techniques to Gather OSINT
Gathering OSINT on people
Ethical and Legal Considerations
Understanding privacy in collection of OSINT
LAB: Gathering People OSINT
Advanced OSINT
Motives of Collection
Gathering OSINT on businesses
Application of data gathered for social engineering
Application of data gathered for hacking (i.e. correlation with exploits)
Ethical and Legal Considerations
LAB: Gathering Business OSINT
Fundamental Social Engineering
What is social engineering
Principles of persuasion
Types of social engineering
Ethical considerations
Social engineering as it pertains to "the hack"
LAB: Interpersonal communications and Pretexting
Applied Social Engineering
Creating payloads
Cloning and standing up phishing web servers
Automated phishing solutions
Spoofing calls for vishing
Physical Security and baiting
Tailgating
Applying the concepts to gain access
LAB: Phishing, Vishing, and Baiting
|
Ethical Hacking Attack Phases Workshop - $999
Download PDF
WHO SHOULD ATTEND?
IT Admins who are interested in cybersecurity, Ethical Hackers, Pen Testers.
WORKSHOP OVERVIEW
Ethical hacking attack phases:
In this workshop you will learn system hacking,
following this you will learn how to hack and
assess web applications. Once you have practices
these hacks, you will learn attacks that target
wireless devices as well as mobile devices. You
will be introduced to techniques to identify the
attack surface and then the vectors for attack
depending on the device(s) encountered.
System Hacking
Overview of CEH Hacking Methodology
Understanding Techniques to Gain Access to the System
Understanding Privilege Escalation Techniques
Understanding Techniques to Create and Maintain Remote Access to the System
Overview of Different Types of Rootkits
Overview of Steganography and Steganalysis Techniques
Understanding Techniques to Hide the Evidence of Compromise
Overview of System Hacking Penetration Testing
LAB: System Hacking
Hacking Web Applications
Understanding Web Application Threats
Understanding Web Application Hacking Methodology
Web Application Hacking Tools
Web Application Security Tools
Overview of Web Application Penetration Testing
LAB: Web Applications
Hacking Wireless Networks
Understanding Wireless Encryption Algorithms
Understanding Wireless Threats
Understanding Wireless Hacking Methodology
Wireless Hacking Tools
Understanding Bluetooth Hacking
Techniques
Wireless Security Tools
Overview of Wireless Penetration Testing
LAB: Hacking Wireless Networks
Hacking Mobile Platforms
Understanding Mobile Platform Attack Vectors
Understanding various Android Threats and
Attacks
Understanding various iOS Threats and Attacks
Mobile Security Guidelines and Security Tools
Overview of Mobile Penetration Testing
LAB: Hacking Mobile Networks
Course includes:
e-Book
Certificate of Attendance (.pdf)
STORM device*
Keyboard
What is a STORM device?
64 Bit Quad Core Mobile System with Case
1 GB RAM
7 inch touch screen display
64 GB MicroSD - Preloaded w/Custom Linux Hacking OS
100Mb Ethernet port
4 USB ports
802.11n wireless
Bluetooth 4.1
Combined 3.5mm audio jack and composite video
Camera interface (CSI)
Display interface (DSI)
VideoCore IV 3D graphics core
Full HDMI
USB 2.0 A to B Micro Power Cable.
[The Storm can be powered from a 5V micro-USB source, Power Supply not included with base package.]
Rollup water resistant keyboard
Field Case Organizer for all your gear
|