• Ethical Hacking Fundamentals training

  • Group Training

    Get a basic understanding on how hackers think and how ethical hacking differs from hacking and how an ethical hacker goes to work.

    Training code
    CGAETHAFCE
    Spoken Language
    English
    Language Materials
    English
    Dayparts
    2
    Price
    €700,00
    excl. VAT No extra costs.

    Book Ethical Hacking Fundamentals now

    This course will mostly take place in a group setting. We use several learning methods to help you obtain the knowledge, give you helpful insights and get you inspired. Check the Spoken Language on the left for language info.

    • 14-3-2022
      Utrecht
      €700,00
      €700,00
    • 22-7-2022
      Utrecht
      €700,00
      €700,00
    • 21-11-2022
      Utrecht
      €700,00
      €700,00
     

    What is Ethical Hacking Fundamentals

    In the training Ethical Hacking Fundamentals participants will get a basic understanding on how hackers think and how this is different from ethical hacking. Participants will get a walkthrough, through different example pentest reports where they will get to know the difference between a good and a great pentest report. The “Threat Modelling” presentation will teach the participants on how to create high level “data flow diagrams” for any application/process and apply the STRIDE/DREAD Methodology to create and understand risks that are relevant to scoping security for a pentest tender/assignment.
    Participants will get an understanding of several OWASP Top 10’s relating to Web, Mobile and API. During this interactive hacking session, the instructor will demonstrate findings relating to OWASP and how this can be translated to risk management. During the Code Reviewing session participants will get an understanding on how to communicate on new functionalities in code and how to achieve their goals while performing code reviews.

     
     

    Who should attend Ethical Hacking Fundamentals

    Ethical hacking can be widely applied. This makes this training interesting for a broad audience, like:

    • Security professionals
    • Security managers
    • Security auditors
    • Network administrators
    • System administrators
    • Developers and Testers

    Prerequisites

    Prerequisites:

    • Computer fundamentals and how they work
    • Know how to use the internet and search engines effectively to gather information
    • Laptop/computer with internet to follow this course.

    Objectives

    After this training, participants:

    • have a basic understanding of the way hackers think
    • know the characteristics of a great pentest report
    • know how to create a dfd and apply the STRIDE/DREAD methodology
    • have an understanding of OWASP Top 10
    • understand how code reviews are performed and what the common pitfalls are.
     
    Incompany

    Get a basic understanding on how hackers think and how ethical hacking differs from hacking and how an ethical hacker goes to work.

    Training code
    CGAETHAFCE
    Spoken Language
    English
    Language Materials
    English
    Dayparts
    2
    Price
    €700,00
    excl. VAT No extra costs.

    With an Incompany training you have several advantages:

    - You choose the location
    - You experience the training with your colleagues, so it is always in line with your practice
    - The trainer can tailor explanations, examples and assignments to your organization
    - In consultation exercises can be adapted to organization-specific questions

    Request more information or a quote.

     

    What is Ethical Hacking Fundamentals

    In the training Ethical Hacking Fundamentals participants will get a basic understanding on how hackers think and how this is different from ethical hacking. Participants will get a walkthrough, through different example pentest reports where they will get to know the difference between a good and a great pentest report. The “Threat Modelling” presentation will teach the participants on how to create high level “data flow diagrams” for any application/process and apply the STRIDE/DREAD Methodology to create and understand risks that are relevant to scoping security for a pentest tender/assignment.
    Participants will get an understanding of several OWASP Top 10’s relating to Web, Mobile and API. During this interactive hacking session, the instructor will demonstrate findings relating to OWASP and how this can be translated to risk management. During the Code Reviewing session participants will get an understanding on how to communicate on new functionalities in code and how to achieve their goals while performing code reviews.

     
     

    Who should attend Ethical Hacking Fundamentals

    Ethical hacking can be widely applied. This makes this training interesting for a broad audience, like:

    • Security professionals
    • Security managers
    • Security auditors
    • Network administrators
    • System administrators
    • Developers and Testers

    Prerequisites

    Prerequisites:

    • Computer fundamentals and how they work
    • Know how to use the internet and search engines effectively to gather information
    • Laptop/computer with internet to follow this course.

    Objectives

    After this training, participants:

    • have a basic understanding of the way hackers think
    • know the characteristics of a great pentest report
    • know how to create a dfd and apply the STRIDE/DREAD methodology
    • have an understanding of OWASP Top 10
    • understand how code reviews are performed and what the common pitfalls are.
     
  • Related

    Fields of Expertise
    Cyber Security
     
  • e-CF competences with this course

     

    At Capgemini Academy we believe in transparency and clarity in the training landscape. That is why, in the table below, we show you to which e-CF competence this training or certification contributes. For more information about how to use the e-Competence Framework read more here. If you want to know how you can apply the e-CF within your organization, read more on this page.

    e-Competence Level12345
    A.5.Architecture Design     
    A.6.Application Design     
    D.2.ICT Quality Strategy Development