The majority of security and hacking tools used today by professional penetration testers and security auditors have been developed for the Unix/Linux environment. Therefore the ethical hacking profession demands individuals to possess more and more Linux technical competences. Linux NinjaTM introduces delegates to the Backtrack distribution, the de facto Linux distribution used by ethical hackers and penetration testers around the world. While learning how to use and customize the Backtrack distribution, delegates will develop important hands-on Linux competences they need to better use existing and future hacking tools. This course is an essential requirement for anyone wishing to become a professional ethical hacker and penetration tester.
Ethical NinjaTM is about ‘doing stuff’ and practically learning how to assess the security posture of an organization before the ‘bad guys’ do. The course has been designed from the ground up to allow you to understand how attacks are commonly carried out by malicious users, and in particular to learn how to apply hacking tools and techniques to gain unauthorized access to information assets. Ethical NinjaTM I focuses on a few selected tools, which are widely used, giving you the opportunity to learn how to use them effectively; the final aim is to understand the mind set of malicious users in order to protect your organization from common attacks.
Ethical Ninja SenpaiTM is about ‘doing stuff’ and practically learning the advanced techniques used by hackers to penetrate an organization’s network and systems. This course goes beyond the standard hacking techniques and covers the more advanced exploits and tools used by hackers to reach the inner most sensitive areas of an organization and steal valuable information without getting caught. The course also addresses advanced hacking techniques used by hackers to compromise client machines to be used in bot nets. Ethical Ninja SenpaiTM focuses on a selected range of tools, showing how they are tailored and used efficiently to achieve the most damage. The final aim of the course is
to understand the advanced hacking techniques of malicious users in order to protect your organization from the more stealth and targeted activities that go beyond common hacking attacks. By attending this course you will learn how to test your organization against such advanced attacks before it is done by the ‘bad guys’!
Mobile Security SharkTM is a practical course designed to address the risks of using mobile devices for both personal, corporate and mobile banking applications. The aim of this course is to equip users of mobile devices and mobile applications with the knowledge and competences necessary to minimize the risks of owning devices such as Blackberry, iPhone, iPad and Android. Mobile users are exposed, virtually 24x7, to a wider range of attacks which could result in financial loss, disclosure and loss of sensitive information. Through this course delegates will learn how to assess and maintain the security of mobile devices and applications as well as assessing the risks of using mobile devices in a wide range of day to day scenarios, from simply making and receiving calls to reading emails, using social sites, paying bills and transferring money.