Take your ethical hacking skills to the next level with our three-day Weaponised Cyber Range training. This course will give you hands-on experience to help secure your business environment.
Develop knowledge of an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You'll cover topics including intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows and virus creation.
Develop the expertise to plan, design and implement an effective program to protect SCADA systems. You'll gain an understanding of common Industrial Control Systems (ICS) threats, vulnerabilities and risks, and how they can be managed.
Gain insight into the insecurities, vulnerabilities and exploits that lie within web applications so you can reduce the risk this poses to your business.
Learn about insecurities, vulnerabilities and exploits that lie within web applications and how to use secure design and development best practices to eliminate these risks.
Get hands-on lab experience and learn about the tools used by real attackers. You will have the opportunity to scan, test, hack and secure your own system so you can go away and improve the resilience of your organization.
Learn about the most common insecurities and vulnerabilities within mobile applications, how to identify them and how to use secure design and development best practices to eliminate risks. This course will give you the confidence to reduce the risk of mobile applications for your business.