CEIB Education
  • Naslovna
  • Obuke
    • Sistemi menadzmenta i upravljanja >
      • ISO 9001 obuke
      • Zadovoljstvo korisnika
      • Upravljanje organizacijama na osnovu analize rizika
      • INTERNI AUDITORI SISTEMA MENADzMENTA
      • GDPR
      • ISO 27001
      • ISO 27701
      • ISO 31000
      • ISO 37001
    • Forenzika i revizija >
      • Politika klasifikacije podataka
      • intervjuisanja u otkrivanju prevare
      • Revizija prevara za interne revizore
      • Forenzička analiza
    • IT / ICT >
      • Teorija informacione bezbednosti
      • Hacking and defending
      • Web and Mobile Ethical Hacking
      • White hat hacker
    • Blockchain tehnologija >
      • Blockchain - pojmovi, primena i rizici
      • Forenzicka istraga kriptovaluta
      • Izrada blockchain platformi
    • Besplatne video obuke
    • Utisci i evaluacije
  • Reference
    • Foto
    • Mediji
    • Kontakt
  • Biblioteka
  • Sarajevo
  • Konferencija Forenzicka revizija
Advanced ICT Security: White Hat Hacker 2.0
Upit za obuku
Opis obuke:

Our most popular information security and hacking training covers the techniques used by malicious, black hat hackers with high energy lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization. You’ll leave with the ability to quantitatively assess and measure threats to information assets; and discover where your organization is most vulnerable to hacking in this network security training course.

The goal of this course is to help you master a repeatable, documentable penetration testing methodology that can be used in an ethical penetration testing or hacking situation.
If the idea of hacking as a career excites you, you will benefit greatly from completing this training. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them.

Learn in the most structured, logical way how to start with as little as a website and end up taking full control over your target systems. Step by step we'll start you with extensively profiling your target. All the way to fully compromising it and making sure you maintain your access. The logical flow of the course will make it easy for you to remember how ethical hacks happen.​

  • Attacking Overview
  • Open-Source Intelligence (OSINT) Reconnaissance
  • Enumeration
    • ​External Recon
    • ​Internal Recon
  • Social Engineering Attacks
  • Bypassing Windows User Account Control (UAC)
  • ​Powershell For Red Teams
  • Lateral Movement
  • ​Network Persistence
  • ​Evasion & Obfuscation
  • Data ​​Exfiltration and stealing
  • Attacking Linux/Unix Environments
  • Attacking ICS/SCADA
  • Privilege Escalation​​ 
Centar za ekonomska istraživanja Beograd, 
Proudly powered by Weebly
  • Naslovna
  • Obuke
    • Sistemi menadzmenta i upravljanja >
      • ISO 9001 obuke
      • Zadovoljstvo korisnika
      • Upravljanje organizacijama na osnovu analize rizika
      • INTERNI AUDITORI SISTEMA MENADzMENTA
      • GDPR
      • ISO 27001
      • ISO 27701
      • ISO 31000
      • ISO 37001
    • Forenzika i revizija >
      • Politika klasifikacije podataka
      • intervjuisanja u otkrivanju prevare
      • Revizija prevara za interne revizore
      • Forenzička analiza
    • IT / ICT >
      • Teorija informacione bezbednosti
      • Hacking and defending
      • Web and Mobile Ethical Hacking
      • White hat hacker
    • Blockchain tehnologija >
      • Blockchain - pojmovi, primena i rizici
      • Forenzicka istraga kriptovaluta
      • Izrada blockchain platformi
    • Besplatne video obuke
    • Utisci i evaluacije
  • Reference
    • Foto
    • Mediji
    • Kontakt
  • Biblioteka
  • Sarajevo
  • Konferencija Forenzicka revizija