Ethical Hacking – Level 1
Prerequisites :
- Knowledge of networks and Windows/Linux systems
- CISR1 certification
Schedule a meeting
Certified Courses
Training content
- Definition
- Typology of attackers
- Terminology
- PTES
- OWASP
- OSSTMM
- Red Team / Blue Team
- Unified Kill Chain
- Contract and legal context
- Scope of the audit
- Pentester's toolkit
- Cloud setup for testing
- How to organize a report
- Virus, Worm, Trojan horse
- Backdoor, Spyware, Keylogger
- Exploit, Rootkit, Ransomware
- Spam, Phishing, Hoax, Spearphishing
- Botnet
- Network and vulnerability scanners
- Introduction to OSINT
- OSINT methodology
-
Examples: Google Dorks, email search, subdomain search
TARGET AUDIENCE :
- System and network technicians and administrators
- Security architects
- Security integrators
- Cybersecurity students
- Security managers
- Security auditors
Key figures of the training
95,6%
Success rate
93,05%
Completion rate
99%
Satisfaction rate