Difference between revisions of "Security Workshop - Ethical Hacking"
Jump to navigation
Jump to search
Sara.alamin (talk | contribs) (→Instructors) |
Sara.alamin (talk | contribs) (→Registration form) |
||
(3 intermediate revisions by the same user not shown) | |||
Line 23: | Line 23: | ||
* Date: Sunday 27 Oct - Wednesday 30 Oct 2019 | * Date: Sunday 27 Oct - Wednesday 30 Oct 2019 | ||
* Time: 8:30AM - 3:30PM | * Time: 8:30AM - 3:30PM | ||
+ | |||
+ | ==Workshop Fees== | ||
+ | 200SDG | ||
==Instructors== | ==Instructors== | ||
− | Hiba Alamin | + | * Hiba Alamin |
==Agenda== | ==Agenda== | ||
Line 37: | Line 40: | ||
* Overview about other security fields | * Overview about other security fields | ||
* Security polices and Recommendations | * Security polices and Recommendations | ||
+ | |||
+ | ==Registration form== | ||
+ | https://docs.google.com/forms/d/e/1FAIpQLSfsSnrErNrEx2kgKToczh8sB0vB3IoAa7fGH-X4XnQWGIS5PQ/viewform?usp=sf_link |
Latest revision as of 17:10, 10 October 2019
Contents
Introduction
This workshop is designed for system administrators, network administrators, auditors and web developers to gain knowledge about the security assessment and penetration testing processes. In addition, it will help to improve network and systems by analyzing the existing vulnerabilities to defend systems against attacks.
Objectives
By the end of this course you will be able to:
- Define Ethical Hacking concepts
- Determine different threats.
- Apply techniques and use penetration testing tools
- Provide defence against different types of attack.
Workshop Level
Intermediate level
Requirements
- Laptop with wireless capability.
- Good Network concepts.
- System concepts
- Basic/intermediate Linux Knowledge.
Date & Time
- Date: Sunday 27 Oct - Wednesday 30 Oct 2019
- Time: 8:30AM - 3:30PM
Workshop Fees
200SDG
Instructors
- Hiba Alamin
Agenda
- Introduction to Ethical Hacking
- Foot-printing and Reconnaissance
- Scanning Networks & Enumeration
- System Hacking
- Sniffing
- Social Engineering
- Denial-of-Service
- Overview about other security fields
- Security polices and Recommendations