e-learning cybersecurity ethical hacking

Practical course - 1d - 04h20 - Ref. 8EH
Price : 190 € E.T.

e-learning cybersecurity ethical hacking




How can you defend your systems without understanding the attackers' tactics? Dive into the fascinating world of Ethical Hacking with our specialized channel, designed to introduce you to intrusion techniques and vulnerability analysis. Learn how to think like a hacker to better protect your sensitive data.


Prêt à
l'emploi
Clés en
main
À la carte


Chaîne e-learning accessible sur la E-academy by ORSYS

Ref. 8EH
  04h20
Prix : 190 € E.T.
Language : EN
This course is also available in English.
Optional :
Tutorat : 199 € HT




How can you defend your systems without understanding the attackers' tactics? Dive into the fascinating world of Ethical Hacking with our specialized channel, designed to introduce you to intrusion techniques and vulnerability analysis. Learn how to think like a hacker to better protect your sensitive data.


Teaching objectives
At the end of the training, the participant will be able to:
Learn about the different types of hackers, their motivations and methodology.
Use certain tools (Kali Linux, Nmap, Metasploit) that make it easier to infiltrate systems.
Know the recommendations and countermeasures associated with each type of attack.
Identify attacks and services.
Understanding defense mechanisms.
Know safety procedures.
Understand the basic principles of application vulnerabilities.
Discover the tools for exploiting application vulnerabilities on Linux and Windows.
Study the exploitation of remote application vulnerabilities.

Intended audience
Developers, CISOs or CIOs.

Prerequisites
Good knowledge of programming, network operation and computer architecture.

Practical details
Digital activities
IT structure: recorded courses, expert videos and best practice sharing.
Mentoring
L’option tutorat propose un accompagnement personnalisé par un formateur référent ORSYS, expert du domaine. Adapté aux besoins, aux capacités et au rythme de chaque apprenant, ce tutorat combine un suivi asynchrone (corrections personnalisées d’exercices, échanges illimités par message…) et des échanges synchrones individuels. Bénéfice : une meilleure compréhension, le développement des compétences et un engagement durable dans la formation.
Pedagogy and practice
A wealth of content produced by trainers following a rigorous pedagogical approach. During each course, operational cases are commented on by experts to help learners put into practice what they have just learned. To help learners anchor their memory, each content item is broken down into short sequences of 3 to 10 minutes. This enables each learner to learn dynamically and independently.

Course schedule

1
Ethical Hacking, learning the fundamentals of computer security

  • Understanding ethical hacking.
  • Understand the fundamentals of ethical hacking.
  • Recognition phase.
  • Understand network scanning.
  • Discover system access.

2
Ethical Hacking, understanding the notion of fingerprinting

  • The stages of a computer attack.
  • Tools for finding information.
  • Computer fingerprinting.

3
Ethical Hacking, learning about the attack techniques used in application vulnerabilities

  • Understand the basic principles of application vulnerabilities.
  • Discover the microprocessor and memory.
  • Learn the basics of assembly language.
  • Understanding buffer overflow.
  • Use SEH protection.