System administrators, information security specialists and -managers, any other cyber security focused IT personnel. The course is easy to follow and is suitable for individuals with some experience in IT systems administration.
- The course is extremely practical and follows a scenario based design. It’s ideal for cyber security professionals that want to understand the step-by-step approach to exploiting IT systems. Case studies, motivation and mindset, attack vectors, counter measures, best practices, tools and methods will be discussed.
- The course is split into 2 days. First day combines lectures with practical exercises on each topic to provide good insights into how hackers attack companies and access critical resources and data. Second day provides the students with an opportunity to tie it all together and put it into practice by attacking a test environment that simulates an actual company.
- Materials will be provided. Upon finishing the course, a signed certificate of completion by KPMG will be granted to participants. Participants are required to use their own (VPN enabled) laptop during the course.
Duration: 2 days
Group size: max 15 participants
Price: 499 EUR + VAT, register before 22.10 to receive an early bird price of 459 EUR + VAT
Location: KPMG Estonia training facility (Narva mnt 5, Tallinn)
* Instructions (room, floor, parking etc) provided after registration.
* In case of coronavirus related restrictions, an online/hybrid course or alternative dates will be provided.
- Introduction: Hacker mindset lecture and setting up access to the lab environment.
- Reconnaissance: Banner grabbing, fingerprinting, service mapping, port- & vulnerability scanning.
- Weaponization: Finding vulnerabilities, suitable exploits and staging your attacks.
- Delivery: Sending the weaponized bundle to the victim.
- Exploit: Executing code on the victim’s system.
- Installation: Installing malware on the target asset.
- Command and Control: Creating a channel where the attacker can control a system remotely.
- Actions: Carrying out actions to find sensitive data and exfiltrate it.
- A practice game (CTF – capture the flag format) on KPMG Estonia’s CTF platform to solidify learned skills and knowledge from day one. Performing attacks on test environment to gain access to sensitive data and critical resources in order to compromise the target company.
* Snacks, lunch and refreshments will be provided.
Registration link HERE.
More information: Marek Mühlberg, firstname.lastname@example.org