Course Overview

Category / Topic: Cybersecurity, Ethical Hacking, Systems Administration

Language: Czech

Learning Format: Online

€752
-- or --

Request Your Own Session

We’ll get back to you with the best tailored offer.

{"title":"Penetration testing and ethical hacking","shortDescription":"The Penetration Testing and Ethical Hacking course is intended for administrators of Windows and Linux servers. During the training, you will learn to use basic tools and techniques for hacking. The training demonstrates practical attack possibilities on LAN networks and local machines (primarily client Windows). After completing this course, you will be able to use the KALI Linux and Samurai security distributions to check your own systems. The entire training consists of many practical labs in both Windows and Linux environments.","description":"<h2>Advance Your Skills in Penetration Testing and Ethical Hacking</h2>\n\n<p>Join our comprehensive course designed to empower you with essential skills in ethical hacking and penetration testing. Gain hands-on experience with the latest tools and techniques, ensuring you are well-prepared for challenges in cybersecurity.</p>\n\n<ul>\n<li><strong>Target Audience:</strong> IT professionals, network administrators, and security enthusiasts.</li>\n<li><strong>Course Duration:</strong> 3 days.</li>\n<li><strong>Course Format:</strong> Online (join virtually).</li>\n<li><strong>Certification:</strong> Yes, a certificate will be awarded upon completion.</li>\n</ul>\n\n<h3>Detailed Course Description</h3>\n<ul>\n<li><strong>Skills Gained:</strong> Mastery of Windows command usage, network analysis, ethical hacking principles, virus handling, and network layer attacks.</li>\n<li><strong>Course Outline:</strong>\n <ul>\n <li>Basic Windows commands for user, process, and network management</li>\n <li>Introduction to network analyzers like Wireshark and Network Monitor</li>\n <li>Fundamentals of ethical hacking</li>\n <li>Specialized scanners for website server checks</li>\n <li>Understanding and removing viruses with practical examples</li>\n <li>Network layer attack descriptions</li>\n <li>Bypassing firewalls, IDS, and honeypots</li>\n <li>Remote access protection with VPNs and potential attacks</li>\n <li>Post-attack actions on compromised computers</li>\n </ul>\n</li>\n<li><strong>Bonuses:</strong> Access to exclusive course materials and follow-up consultations with instructors from ICT Pro.</li>\n</ul>\n\n<p>Don't miss this opportunity to enhance your cybersecurity skills! Enroll today to secure your spot and take your career to the next level!</p>","rating":0,"reviewCount":0,"reviews":[]}