Information Security HIM Hacking Insight for Managers

Provided by

Enquire about this course

About the course

Ethical Hacking
Hacking Insight for Managers (HIM)
Awareness - level course

This one-day awareness course is for people who need a high level understanding of hacking rather than practical know-how. It introduces the basic technical concepts behind the various stages of a hacking attack, as well as some common tools used by hackers and security professionals.​

How will I benefit?
On this course, you will:

  • Gain an understanding of IT security from an attacker’s perspective
  • Be able to evaluate the possible risks to your business from hackers
  • Understand the principles of how to defend your organisation effectively from the risk of attack

“Excellent instruction; clear and concise overview, perfect for non-specialists.”

HIM Delegate PA Consulting Group

​What will I learn?

  • You will gain an insight into the mindset and motivation of hackers, and learn how they infiltrate organisations and the damage that can follow
  • You will find out how organisations are exposed through the various routes of attack, including the internet, employees, social engineering, emails and wireless
  • You will learn about the security lapses behind a number of real world, high-profile attacks
  • You will have the chance to try your hand at some simple web application attacks in our ‘hack lab’


Who should attend?
Anyone interested in understanding the risks that hackers pose including:

  • IT Managers 
  • Systems Analysts
  • IT Security Professionals & Auditors
  • Security Officers & Data Protection representatives

COURSE OVERVIEW

Assuming no prior information security knowledge, the course is ideally
suited to anyone requiring a high-level understanding of techniques and current trends used in hacking without the need for practical know-how. Examples are drawn from real-world breaches to show
how lapses in security have resulted in high-profile damage to organisations and customers.

This is a multimedia theory-based course with group discussions. Should there be time and interest, there is also the opportunity to join a guided “hack lab”, in which you can try your hand at some simple web application attacks (Wi-Fi enabled device required).

THE SKILLS YOU WILL LEARN

  • You will gain an insight into the mindset and motivation of hackers, and
  • learn how they infiltrate organisations and the damage that can follow
  • You will find out how organisations are exposed through the various routes of attack, including the internet, employees, social engineering, emails and wireless
  • You will learn about the security lapses behind a number of real-world, highprofile attacks
  • You will have the chance to try your hand at some simple web application attacks in our ‘hack lab’


KEY BENEFITS
On this course, you will:

  • Gain an understanding of IT security from an attacker’s perspective
  • Be able to evaluate the possible risks to your business from hackers
  • Understand the principles of how to defend your organisation effectively from the risk of attack

WHO SHOULD ATTEND
Anyone interested in understanding the risks that hackers pose, including:

  • IT managers
  • Systems analysts
  • IT security professionals and auditors
  • Security officers and data protection representatives

For a course with more hands-on technical content, delegates should
consider 7Safe’s CSTA and CSTP courses.

PREREQUISITES

  • No information security knowledge is needed, just basic computer literacy
  •  We recommend you read up on the concept of domain names and IP addresses before the course
  • Bring with you a Wi-Fi enabled device to join the ‘hack lab’ exercise (e.g. laptop or tablet)

Syllabus
1. Introduction – terminology, motivations, the lie of the land,
methodology

2. Information gathering – from harvesting open-source
information to social engineering
3. Target scanning, including port scanning
4. Vulnerability assessment, including the threat from client side software
5. Exploitation, including attack pivoting
6. Privilege escalation, including password attacks
7. Retaining access, including botnets
8. Covering tracks
9. Team exercise – incident handling scenario
10. Web application attacks – threats, OWASP Top Ten
11. SQL injection
12. Conclusion – trends
13. Hack lab – practical attack
scenarios

Book your training three months in advance of the course start date and get a 20% discount, as reflected in the pricing below

 

Enquire

There are currently no new dates advertised for this course

Related article

CYBER PULSE: EDITION 133 | 14 OCTOBER 2020 Read the latest edition of Cyber Pulse: Beware of scams and lures around Amazon Prime Day 2020, Apple bug