Exclusive Discounts - Pay Online and Grab Up to 40% Discount on Certified Courses Across 15 Knowledge Areas HERE.
Partner
Exam Preparation

CompTIA S+
CompTIA Security+

Rating:
4.8
English
Advanced
Video preview
FACE 2 FACE
ON SITE TRAINING
LIVE VIRTUAL
TRAINING
COACHING
& MENTORING
SELF-PACED
TRAINING
Select Date
Download Brochure

Course Overview

Whenever you are developing an application or just writing code, you have to do extensive testing, not only for the straight forward test cases, but also for the cases that may lead to vulnerabilities in your system. If there is one way to make the application work, you have to think of the infinity - 1 ways that will make the application stop. In this course, we will have a deep overview about the hacking theories and practical techniques in order to be able to accomplish several hacking attempts. Since this course will be delivered online, we will be using online hacking tools that work on any desktop regardless of the setup and regardless of the operating system.

Key Takeaways

1
Learn what is ethical hacking, its fields and the different types of hackers.
2
Install hacking lab & needed software (works on Windows, OS X and Linux).
3
Hack & secure both WiFi & wired network.
4
Discover vulnerabilities & exploit them hack into servers.
5
Hack secure systems using client-side and social engineering attacks.

SkillSoft
Brand Logo
At Skillsoft, we believe every individual has the poten-tial to be amazing. Our vision is to unleash that poten-tial through the power of learning. As the world’s largest provider of professional digital learning, Skill-soft delivers:
• Online learning that includes a broad catalogue of in-demand topics, built with deep expertise in the subject matter and scientifically proven learning science;
• Engaging learning experiences ranging from micro-learning to complete journeys and professional certifications that have impacted nearly half a billion people worldwide and certified more IT professionals than any firm on the planet; and
• A powerful, flexible, and engaging cloud-native plat-form designed to seamlessly integrate both with lead-ing HCM solutions and the natural flow of work.
Unlike other providers, Skillsoft is inclusive, with learning options for all. Our effectiveness, variety and global reach are unmatched.

Course Outline

Part 1
→ Introduction to Ethical Hacking and Cyber Security | Theory
→ What are the various types of hackers | Theory
→ Introduction to Kali Linux | Lab
→ Why Kali Linux is considered the best operating system for hacking | Theory
→ What are the best built in tools in Kali Linux for hacking | Lab
→ We will use an online platform called LinuxZoo.net that allows us to install Kali Linux on an online server and use it for free
→ Moreover, we will show the participants how to really download Kali Linux from the official website (Kali.org) and how to use the VirtualBox tool (VirtualBox.org)
Part 2
→ What is SQL Injection | Theory → Dangers of SQL Injection Vulnerabilities | Theory
→ Bypassing Logins Using SQL injection Vulnerability | Lab
→ What is SQLMap and how is it used? | Lab
→ Reading Database Information | Lab
→ Finding Database Tables | Lab
→ Extracting Sensitive Data Such As Passwords | Lab
→ First, we will use the below website to try to login using a fake username and password: https://www.hacksplaining. com/exercises/sql-injection and https:// www.codingame.com/playgrounds/154/ sql-injection-demo/sql-injection and http://testphp.vulnweb.com/login.php
→ Then, we will go more deep into SQL Injection by playing this interactive hacking game online, and we will learn how to think as hackers: https://injection. pythonanywhere.com/sql1/
Part 3
→ What is Phishing? | Theory
→ Why is it used? | Theory
→ Can you differentiate between these 2 websites? (One is normal and one is phishing) | Lab
→ What do we need to create a phishing page? | Lab
→ What is Social Engineering? What is SE Toolkit and how is it used? | Lab
→ We will use this tool to learn how to spot a phishing website: https://phishingquiz. withgoogle.com/
→ We will use the real code of the login page of Google accounts (gmail) and we will host it on a free server which is 000webhost.com. We will modify the code to convert the initial login page of gmail to a phishing page
Part 4
→ What is Network Sniffing? | Theory
→ What is Password Sniffing? | Theory
→ What are the tools used to steal passwords by sniffing packets? | Lab
→ Can we steal passwords on HTTPS websites or only HTTP? | Lab
→ We will ask the participants to download WireShark on their computers to sniff packets on the network.
→ After that, we will use an Online website called Caisis.org/demo. This is a non secure website. We will login on this website and we will go to WireShark and filter the packets and we will see the username and password that we entered
Part 5
→ Understanding the concept of Password Cracking | Theory
→ Why and how are passwords cracked? | Lab
→ What is Encryption and Decryption? | Lab
→ First, we will use a website called PasswordMeter.com to check the strength of our password
→ Then, we will use an official website from Kaspersky called Password.Kaspersky.com to check how much time it needs for our password to by cracked
→ Then, we will use the best online tool for Encryption and Decryption called cryptii.com → At the end, we will ask the participants to install Cain and Abel, and then we will create a new user on our computer and see how we can crack its password
Part 6
→ What is the concept behind Viruses? | Theory
→ How are they made? What are the various purposes of Viruses? | Theory
→ How are they transmitted? | Lab
→ What’s the difference among a Virus, Trojan and Worm | Lab
→ How to send fake emails from trusted addresses like [email protected] | Lab
→ We will create our own Virus with a purpose to harm the computer of the victim by disabling all antiviruses first then deleting all his files. Then, we will learn how to hide the virus by appending it to an image, and sending it to the victim using a Fake Email

Who Should Attend?

This highly practical and interactive course has been specifically designed for
This course is relevant for senior managers and executives who are involved in crafting IT strategies and leading security transformation program for their companies. It is equally useful for anyone who wants to learn about IT and how can technology create value in their profession today.

Related Courses

FAQ

What language will the course be taught in and what level of English do I need to take part in an LEORON training program?
Most of our public courses are delivered in English language. You need to be proficient in English to be able to fully participate in the workshop and network with other delegates. For in-house courses we have the capability to train in Arabic, Dutch, German and Portuguese.
Are LEORON Public courses certified by an official body/organization?
LEORON Institute partners with 20+ international bodies and associations.We also award continuing professional development credits (CPE/PDUs) for:1. NASBA (National Association of State Boards of Accountancy) 2. Project Management Institute PDUs 3. CISI credits 4. GARP credits 5. HRCI recertification credits 6. SHRM recertification credits
What is the deadline for registering to a public course?
The deadline to register for a public course is 14 days before the course starts. Kindly note that occasionally we do accept late registrations as well, but this needs to be confirmed with the project manager of the training program or with our registration desk that can be reached at +91 4 95 5711 or [email protected].
What does the course fee cover?
The course fee covers a premium training experience in a 5-star hotel, learning materials, lunches & refreshments, and for some courses, the certification fee and membership with the accrediting bodies.
Does LEORON give discounts?
Yes, we can provide discounts for group bookings. If you would like to discuss a discount on a corporate level, we will be happy to talk to you.

Reviews

  • Review:
    IAMM Internal Audit Maturity Model
    In recognition of their dedication and contribution supporting IKEA Saudi Arabia in arranging training programs during 2017 & 2018, looking forward for more development and exciting effort this year. On behalf of IKEA Saudi Arabia, THANK YOU!
    Dalal Kutbi
  • Review:
    Certified Professional in Quality and Patient Safety
    Dating back to 2014, Mobily’s “LEORON” experience has grown from a single collaboration to a long-term partnership. We consider “LEORON” Institute as a strategic partner, whose contribution has been nothing but premium in equipping our staff with field-based knowledge and information. Past three years have resulted with an expanded collaboration with superior customer service and support. Best Regards,
    Turki S. Alsahaan
  • Review:
    Certified Professional in Quality and Patient Safety
    Since the partnership was signed between BAE Systems Saudi Development & Training and LEORON in 2017, we have been working together to offer the Saudi market a complete portfolio of training solutions benefiting from the wide and extensive experience of both parties. Recognizing the great success of this partnership, we are looking for further collaborations in the future that will position both companies as one of the leading training providers in Saudi Arabia. We thank the LEORON team for their full cooperation and continuing support, and look forward to further success together in the years to come.
    Emad Alrajih
  • Review:
    Certified Professional in Quality and Patient Safety
    We have been working with LEORON for the past two years and will be working with them again this upcoming year. The programs they delivered were fruitful and exciting and our organization has received positive feedback from the participants. What our organization aims to do is to provide at no cost training for all the private sector employees so that they may benefit from our offered programs in Innovation and Professional development. LEORON has helped us achieve this goal. We look forward to continuing this service and wish them the best of luck. Regards,
    Nasser M. Al-Subaie