Course

HackLab: Hands-on Hacking

How hackers work

Event languages: Dutch , English

Computer hacking is the practice of influencing computer hardware and software to accomplish a goal outside of their original purpose. A computer hacker is a person who identifies weaknesses and exploits them. Hacking is considered a complex activity. This course will explore the world of hacking and shed a light on how hackers work.

Interested? Send us an email

Course Objectives 

This practical five-day course equips participants with hands-on black box, white box and grey box vulnerability testing. We will address testing of web applications, mobile applications, mobile devices, wireless security, host based and network based infrastructure.

The course takes the participants through the different stages of our proven methodology of information gathering, target selection and vulnerability identification and exploitation. Besides the methodology we will also discuss the different leading practices, such as OWASP and go into the different tools for vulnerability testing.  

  • Practical five-day course
  • Proven methodology of information gathering, target selection and vulnerability identification and exploitation
  • Discuss the different leading practices and go into the different tools for vulnerability testing

Target Group

  • Security managers
  • Application developers
  • IT professionals
  • IT auditors who have an interest in ‘Vulnerability Assessment’ and ’hacking’.

Participants of the course are expected to have a basic understanding of network, TCP/IP and Operating Systems (Windows and Linux).

Program


Day 1
  • Introduction & Security Trends
  • Penetration testing methodology
  • Firewall security / Prevention systems
  • External Infrastructure penetration test
  • Solving hands-on challenges on our portal

Day 2

  • Recap of day 1
  • Infrastructure security tests (External vs Internal)
  • Introduction to malware and demo
  • Cryptography
  • Password cracking
  • Solving hands-on challenges on our portal

Day 3

  • Recap of day 2
  • Application architecture
  • OWASP top 10
  • Denial of service
  • Solving hands-on challenges on our portal

Day 4

  • Recap of day 3
  • Introduction to Red Teaming
  • Tour at the CIC of Deloitte
  • Vulnerability management
  • Digital forensics
  • Solving hands-on challenges on our portal

Day 5

  • Recap of day 4
  • Vulnerability assessment execution of a complete test
  • Reporting and presentation of the results
  • Evaluation and closing

 

Interested in this course contact Linda Otte.
The costs are € 2500 ex VAT. Course materials are included in the price.

Until four weeks before the start of the course you may cancel your participation by email free of charge. Should you cancel within four weeks before the start of the course you will have to pay the full course fee.

Deloitte reserves the right to cancel a course if circumstances dictate. You will be informed of this as soon as possible.

For more information about our Terms and Conditions, please refer to our FAQ page.

If you have any questions, please contact Linda Otte.

Contact

Linda Otte

Linda Otte

Risk Advisory

Ik ben verantwoordelijk voor Learning in het Cyber Risk team. In deze rol ben ik verantwoordelijk om de ultieme learning expercience te creëren voor onze interne professionals. Daarnaast ben ik verantwoordelijk voor de Cyber trainingen die wij aan onze klanten of potentiële klaten aanbieden. Naast learning & development is het coachen van mensen mijn tweede passie. Ik ben dan ook een gecertificeerd coach op het gebied van work/life balance & career coaching.

Share Share event on social
Interested? Send us an email