Course Overview

Category / Topic: Cybersecurity, Ethical Hacking, Network Engineering

Language: Czech

Learning Format: Online

€800
-- or --

Can't Find a Date?
Request a Custom Session

We'll get back to you shortly with a custom offer tailored to your needs.

{"title":"Hacking v praxi II","shortDescription":"Jak zmapovat síť a vyhlédnout vhodné cíle? Jak identifikovat zranitelnosti v serverových službách a jak skrze ně získat přístup na server? Jak dále eskalovat privilegia? Jak kompromitovat uživatelskou stanici s MS Windows? A jak tomu zabránit? Jaké jsou nejzávažnější zranitelnosti webových aplikací? Je vaše VoIP infrastruktura zranitelná? Co je to Darknet a co OSINT? Jakými prostředky bankomat brání útočníkům, aby se dostal k uloženým penězům? Jde se k těmto penězům dostat bez použití hrubé síly? Lze hacknout auto? А co mobilní telefon?\n<br> Přijďte prozkoumat tajuplný svět hackingu a množství jeho jednotlivých zákoutí. Průvodcem na této cestě Vám bude zkušený etický hacker s mnohaletou praxí, který je držitelem certifikací Certified Information Systems Security Professional (CISSP) a Certified Ethical Hacker (CEH) a je připraven se s Vámi podělit se o své zkušenosti z praxe profesionálního etického hackera.","description":"<h2>Master the Art of Ethical Hacking</h2> \n<p>Unlock the secrets of cybersecurity with our comprehensive Hacking in Practice II course. Designed for aspiring ethical hackers, this course equips you with the knowledge and tools necessary to protect against digital threats.</p> \n\n<ul> \n<li><strong>Target Audience:</strong> This course is tailored for cybersecurity enthusiasts, IT professionals, and anyone looking to bolster their hacking skills for ethical purposes.</li> \n<li><strong>Course Duration:</strong> 3 days</li> \n<li><strong>Course Format:</strong> Online</li> \n<li><strong>Certification:</strong> Yes</li> \n</ul> \n\n<h3>Detailed Course Description</h3> \n<ul> \n<li><strong>Skills Gained:</strong> \n - Network Security \n - Workstation Hacking and Security \n - Web Application Security \n - VoIP Security \n - Mobile Device Security \n - ATM Security in Practice \n - Automotive Hacking \n - Understanding the Darknet Ecosystem \n - Utilizing NSA Hacking Tools \n - Social Media Anonymity \n - Steganography Techniques \n - DoS and DDoS Attack Strategies \n</li> \n\n<li><strong>Course Outline:</strong> \n - Introduction to Network Security \n - Hands-on Workstation Hacking \n - Safeguarding Workstations \n - Comprehensive Web Application Security \n - VoIP Vulnerabilities and Protections \n - Mobile Device Threats \n - Real-World ATM Security Practices \n - Automotive Security Risks \n - The Darknet: An Overview \n - Tools of the Trade: NSA Edition \n - Analyzing Social Media Privacy Concerns \n - Basics of Steganography \n - Understanding DoS and DDoS Attacks \n</li> \n\n<li><strong>Bonuses:</strong> \n - Access to exclusive learning materials \n - One-on-one consultation with industry experts \n</li> \n</ul> \n\n<p>Don't miss the chance to elevate your cybersecurity skills! Sign up now for our Hacking in Practice II course and be part of the solution in the digital world.</p> ","rating":0,"reviewCount":0,"reviews":[]}