Wait a minute..

Hacking Playground

This training is designed for participants who want to explore how to penetrate a server (hacking) or want to know about attack tactics in cyberspace.

Live Virtual Classroom
Beginner 0(0 Ratings)
Created by Hacktrace Indonesia
What will I learn?
  • Develop a scope and a set of rules that are adjusted to conduct security testing.
  • Able to carry out detailed searches using document metadata, search engines, and publicly available sources of information (open source).
  • Utilizing a scanner to scan the network thoroughly.
  • Analyze the results of the scanner to verify each finding so that there are no false findings.
  • Utilizing commands on the Windows and Linux operating systems to take over the target system to get important information.
  • Able to operate and use Metasploit to exploit.
  • Conduct comprehensive password attacks, including guessing passwords automatically (while avoiding keeping your account locked), cracking, and pass-the-hash attacks.
  • Scans vulnerabilities for web applications.
Live virtual classroom schedule

Live online features
  • Instructor led, virtual streaming of your course with instructor Q&A
Offers
  • Hacktrace Certification Exam will be send after 7 days after course completion

Curriculum for this course
Introduction
5 Lessons
  • Cybersecurity in the real world today
  • Introduction Kali Linux
  • Basic usage of Kali Linux
  • Passive information gathering
  • Active information gathering
  • Vulnerability identification
  • Windows buffer overflow introduction
  • Fuzzing vulnerable application
  • Writing buffer overflow exploit
  • Using existing public exploit
  • Multiple techniques of transferring files
  • Privilege escalation techniques on Linux OS
  • Privilege escalation techniques on Windows OS
  • Leverage client-side attack
  • Web application exploit
  • Backdooring system
  • Password attack techniques
  • Port tunnel and forwarding
  • Exploitation framework use case
  • Hacking playground in our Offensive Lab
Requirements
  • Cybersecurity specialists, whose duties include vulnerability assessment and remediation.
  • Penetration testers and security assessors.
  • Information security auditors who need to build deeper technical skills.
  • Computer forensic experts who want to learn more about attack tactics.
+ View more
Description

This training is designed for participants who want to explore how to penetrate a server (hacking) or want to know about attack tactics in cyberspace. Participant will gain knowledge about how the pentester or hackers do when taking over a web application or servers. 

+ View more
Other related courses

Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews
Rp 800.000
Ask our team
Rp 800.000
Ask our team