Ethical Hacking BOOTCAMP

Overview

This is a 3 day comprehensive technical awareness training for IT staff, system engineers, security officers, and enthusiasts. Definitely the most advanced, up-to-date security training ever organized, taught by trainers who perform security audits and penetration tests on an almost daily basis!

Students will attack servers, clients, wireless networks, mobile devices, and even humans!
They will create wordlists and crack passwords, generate malware, develop exploits, and detect/hack web vulnerabilities like SQL injection, XSS, CSRF, Heartbleed, DoS, etc.

Objectives

At the end of this training course, the students should be able to assess their own infrastructure for security holes, and to confirm false positives using penetration testing and ethical hacking techniques. In addition, they should be able to implement a defense-in-depth security solution.

We focus on methodologies and procedures, and not only on the software tools. This approach, in combination with our realistic hands-on labs, separates MME's courses from others!

CEH exam

Although this is not an official EC-Council course, students will be prepared to pass the Certified Ethical Hacker (CEHv9) exam with ease. So save your money!

Price: 1235 EUR *

  • Course materials and software
  • Penetration testing distribution
  • Virtual hacking lab and cheats
  • WiFi dongle for packet injection
  • Lunch, drinks, and snacks
  • Certificate of completion

* Early bird price valid if registered 60+ days before the training date. Normal price: 1750 EUR.

Dates

Date Location Capacity Availability
06/09/2017 - 09:00 to 08/09/2017 - 17:00 Melle 10 1
11/10/2017 - 09:00 to 13/10/2017 - 17:00 Melle 10 6
15/11/2017 - 09:00 to 17/11/2017 - 17:00 Turnhout 10 5
13/12/2017 - 09:00 to 15/12/2017 - 17:00 Menen 10 10

On-site

This ethical hacking course track can also be organized at your preferred location, on specific dates. Contact us for more info!

Related

Topics

  • Day 1 - Basics
    • Introduction to Kali Linux
    • Active and Passive Recon
    • Scanning and Enumeration
    • Vulnerability Mapping
    • Exploitation with Metasploit
    • Man-in-the-Middle Attacks
    • Pivoting and Post-Exploitation
    • Offline Password Cracking
    • Hacking Wireless Networks

  • Day 2 - Advanced
    • Advanced Password Attacks
    • Pass-the-Hash Techniques
    • Kerberos Token Impersonation
    • Extracting Windows Credentials
    • Hacking WPA/WPA2/WPS
    • Rogue Access Points
    • Device: the WiFi Pineapple
    • Anatomy of an Exploit
    • Hacking Windows 10/2012
    • Malware and Social Engineering
    • Client-Side Exploits (e.g. Flash)
    • Attacking Mobile Devices
  • Day 3 - Web Applications
    • Introduction to Web Applications
    • Pentesting and Methodologies
    • OWASP and the Top 10 Risks
    • Vulnerabilities and Exploitation
    • Post-Exploitation and Webshells
    • Local Privilege Escalations
    • Vulnerability Detection
    • Web Application Scanners
    • Intercepting Proxies
    • Web Server Hardening

Requirements

  • Own laptop is required (!)
    • Windows, Mac OS X, or Linux
    • Administrator privileges
    • Ethernet and USB interface
    • Ability to disable AV and IPS
    • VMware Player/Fusion installed
  • Basic knowledge in TCP/IP

Contact us

Do not hesitate to contact us if you have any questions. We will gladly help you!