Course Overview

Category / Topic: Cybersecurity, Ethical Hacking, Systems Administration

Language: Czech

Learning Format: Online

€752
-- or --

Can't Find a Date?
Request a Custom Session

We'll get back to you shortly with a custom offer tailored to your needs.

{"title":"Penetrační testování a etický hacking","shortDescription":"Kurz Penetrační testování a etický hacking je určen administrátorům Windows a Linux serverů. V rámci školení se naučí používat základní nástroje a techniky pro hacking. Školení demonstruje praktické možnosti útoků na sítě LAN a lokální stroje (primárně klientské Windows). Po absolvování tohoto kurzu budete schopni používat bezpečnostní distribuce KALI linux a Samurai pro kontrolu vlastních systémů. Celé školení se skládá z mnoha praktických labů v prostředí Windows i Linux.","description":"<h2>Advance Your Skills in Penetration Testing and Ethical Hacking</h2>\n\n<p>Join our comprehensive course designed to empower you with essential skills in ethical hacking and penetration testing. Gain hands-on experience with the latest tools and techniques, ensuring you are well-prepared for challenges in cybersecurity.</p>\n\n<ul>\n<li><strong>Target Audience:</strong> IT professionals, network administrators, and security enthusiasts.</li>\n<li><strong>Course Duration:</strong> 3 days.</li>\n<li><strong>Course Format:</strong> Online (join virtually).</li>\n<li><strong>Certification:</strong> Yes, a certificate will be awarded upon completion.</li>\n</ul>\n\n<h3>Detailed Course Description</h3>\n<ul>\n<li><strong>Skills Gained:</strong> Mastery of Windows command usage, network analysis, ethical hacking principles, virus handling, and network layer attacks.</li>\n<li><strong>Course Outline:</strong>\n <ul>\n <li>Basic Windows commands for user, process, and network management</li>\n <li>Introduction to network analyzers like Wireshark and Network Monitor</li>\n <li>Fundamentals of ethical hacking</li>\n <li>Specialized scanners for website server checks</li>\n <li>Understanding and removing viruses with practical examples</li>\n <li>Network layer attack descriptions</li>\n <li>Bypassing firewalls, IDS, and honeypots</li>\n <li>Remote access protection with VPNs and potential attacks</li>\n <li>Post-attack actions on compromised computers</li>\n </ul>\n</li>\n<li><strong>Bonuses:</strong> Access to exclusive course materials and follow-up consultations with instructors from ICT Pro.</li>\n</ul>\n\n<p>Don't miss this opportunity to enhance your cybersecurity skills! Enroll today to secure your spot and take your career to the next level!</p>","rating":0,"reviewCount":0,"reviews":[]}