-
Ethical Hacking Fundamentals training
-
Get a basic understanding on how hackers think and how ethical hacking differs from hacking and how an ethical hacker goes to work.
Training codeCGAETHAFCESpoken LanguageEnglishLanguage MaterialsEnglishDayparts2Price€700,00excl. VAT No extra costs.Book Ethical Hacking Fundamentals now
In group training, we use several learning methods to help you obtain the knowledge, give you helpful insights and get you inspired. Check the Spoken language and Language materials on the left for language info.
-
22-2-2023Online Virtual
What is Ethical Hacking Fundamentals
In the training Ethical Hacking Fundamentals participants will get a basic understanding on how hackers think and how this is different from ethical hacking. Participants will get a walkthrough, through different example pentest reports where they will get to know the difference between a good and a great pentest report. The “Threat Modelling” presentation will teach the participants on how to create high level “data flow diagrams” for any application/process and apply the STRIDE/DREAD Methodology to create and understand risks that are relevant to scoping security for a pentest tender/assignment.
Participants will get an understanding of several OWASP Top 10’s relating to Web, Mobile and API. During this interactive hacking session, the instructor will demonstrate findings relating to OWASP and how this can be translated to risk management. During the Code Reviewing session participants will get an understanding on how to communicate on new functionalities in code and how to achieve their goals while performing code reviews.Who should attend Ethical Hacking Fundamentals
Ethical hacking can be widely applied. This makes this training interesting for a broad audience, like:
- Security professionals
- Security managers
- Security auditors
- Network administrators
- System administrators
- Developers and Testers
Prerequisites
Prerequisites:
- Computer fundamentals and how they work
- Know how to use the internet and search engines effectively to gather information
- Laptop/computer with internet to follow this course.
Objectives
After this training, participants:
- have a basic understanding of the way hackers think
- know the characteristics of a great pentest report
- know how to create a dfd and apply the STRIDE/DREAD methodology
- have an understanding of OWASP Top 10
- understand how code reviews are performed and what the common pitfalls are.
Get a basic understanding on how hackers think and how ethical hacking differs from hacking and how an ethical hacker goes to work.
Training codeCGAETHAFCESpoken LanguageEnglishLanguage MaterialsEnglishDayparts2Price€700,00excl. VAT No extra costs.With an Incompany training you have several advantages:
- You choose the location
- You experience the training with your colleagues, so it is always in line with your practice
- The trainer can tailor explanations, examples and assignments to your organization
- In consultation exercises can be adapted to organization-specific questions
Request more information or a quote.What is Ethical Hacking Fundamentals
In the training Ethical Hacking Fundamentals participants will get a basic understanding on how hackers think and how this is different from ethical hacking. Participants will get a walkthrough, through different example pentest reports where they will get to know the difference between a good and a great pentest report. The “Threat Modelling” presentation will teach the participants on how to create high level “data flow diagrams” for any application/process and apply the STRIDE/DREAD Methodology to create and understand risks that are relevant to scoping security for a pentest tender/assignment.
Participants will get an understanding of several OWASP Top 10’s relating to Web, Mobile and API. During this interactive hacking session, the instructor will demonstrate findings relating to OWASP and how this can be translated to risk management. During the Code Reviewing session participants will get an understanding on how to communicate on new functionalities in code and how to achieve their goals while performing code reviews.Who should attend Ethical Hacking Fundamentals
Ethical hacking can be widely applied. This makes this training interesting for a broad audience, like:
- Security professionals
- Security managers
- Security auditors
- Network administrators
- System administrators
- Developers and Testers
Prerequisites
Prerequisites:
- Computer fundamentals and how they work
- Know how to use the internet and search engines effectively to gather information
- Laptop/computer with internet to follow this course.
Objectives
After this training, participants:
- have a basic understanding of the way hackers think
- know the characteristics of a great pentest report
- know how to create a dfd and apply the STRIDE/DREAD methodology
- have an understanding of OWASP Top 10
- understand how code reviews are performed and what the common pitfalls are.
-
Brochure
Related
e-CF competences with this course
At Capgemini Academy we believe in transparency and clarity in the training landscape. That is why, in the table below, we show you to which e-CF competence this training or certification contributes. For more information about how to use the e-Competence Framework read more here. If you want to know how you can apply the e-CF within your organization, read more on this page.
e-Competence Level | 1 | 2 | 3 | 4 | 5 |
---|---|---|---|---|---|
A.5.Architecture Design | |||||
A.6.Application Design | |||||
D.2.ICT Quality Strategy Development |