Course Description
Expand your Information Security Career with our Tailored Course. Understand how to defend threats aimed at your company by learning from an Offensive Security perspective. This course is divided into 5 chapters that will help you create your own private workshop lab, as hackers do. We will start with the basics of learning the Linux Operating System in order to understand the mindset of how to use the terminal. As we progress, we will go into the reconnaissance and open source information (OSINT) techniques, moving to the attack phase and post exploitation, and we will close with social engineering and phishing attack techniques. Helping you get closer with the mindset of a hacker, so you can take drastic measures in mitigating the risks and enhancing the steps needed to prevent, and minimize the impact for when you go through such an event even on a corporate environment. By the end of this course, you will be able to understand all the hacking methodologies.
Pre-Requirements*
- Understanding on TCP/IP Networking, and layers
- Familiar with Linux Environments, as an operating System
- Basic Programming such as Python, Perl, Shell, C+
- Scripting with BASH
- Windows Sys Admin and Shell
Who this course is for?
- Security Researchers
- Penetration Testers and Red Teamers
- Bug Bounty Hunters
- Aspiring Ethical Hackers
- Cyber Security Field
This course includes:
- Course Duration: 12 hours
- Course Access: 1 Year
*Contact us if you would like to extend your access for free.
- Certification of Completion
- FHD (1080p) Episodes Hosted on Vimeo
- Supported also on Mobile, Tablet & TV
- Downloadable Resources
Course Content
- Workshop – Preparation Guide
- Chapter 1: Learning Linux
- Chapter 2: Reconnaissance and OSINT
- Chapter 3: Attacks
- Chapter 4: Post Exploitation
- Chapter 5: Phishing Attacks and Social Engineering
*Note: The above is recommended before taking our courses but are not mandatory. The reason is that each individual’s background when it comes to the offensive security world, varies, based on our experience, the above pre-requirements are needed in order to become better as you progress in this field.
€97
Some of the topics that this course will cover:
Disclaimer: This Course is performed for education purposes only. It will help you expand your knowledge of Offensive Security. Everything is done on self-owned machines, and we are not responsible for any damage done in reference to this course. Black Hat Ethical Hacking or any security research engineer performing this demo is not held responsible nor do we influence the actions of others for such techniques that could be illegal if used for unethical reasons to be done WITHOUT the consent of the other party involved.
Course Chapters
€97
Get in touch with BHEH!
Reach out to us for more information.