Ideal for Chief Information Security Officer, Security Architect or a DevOps developer, this course will you in finding out about the types of tools hackers are likely to use to infiltrate their business network.
Do you need to analyse penetration forensic tests to quickly discern the difference between critical and non-critical threats so you are better informed to take the right protective measures faster?
If so, our unique hands-on, hacking security training will benefit you greatly.
The course is a role-playing game where you take on the persona of a hacker who is recruited by a hacking group called ‘Impact 016’. As you learn more techniques, you will progress through the storyline and gain access to more systems, which in turn opens up more of the storyline.
While we will cover a wide range of security topics, it is not designed to teach everything. The aim is to provide you with enough baseline knowledge so you can continue learning more about ethical hacking.
The following topics are covered:
Training is hands-on where you learn the initial information and then put it to use in a simulated target network.
Our team are seasoned, experienced and business-minded security consultants with an average of 10 years experience having conducted hundreds of training programs for organisations large and small.