ETHICAL HACKING
It fits those who want to pursue a career in Pen Testing, but also in Blue Teaming or in network administration. Five days to get inside the hackers mind to become better protectors.
WEB APPLICATION PEN-TESTING
Through real cases of vulnerabilities identified in prominent sites such as Google, Facebook, Yahoo, etc., a deep understanding of the attack techniques, form the most common to the most advanced.
HACKING BY METASPLOIT
To hone pen-testing skills by Metasploit, the world most famous penetration test framework.
THE ART OF SOCIAL ENGINEERING 1
Understanding of massive phishing, spear phishing and phone pretexting, showing real use cases and explaining the psychological mechanisms, which allow maximizing the effectiveness of such attacks.
SECURITY: NETWORK & SYSTEM ADMINISTRATOR EDITION
Learn how to protect your IT infrastructure as active director by means of endpoint, server and complex settings hardening.
SECURE PROGRAMMING
Learn how to create a secure by-design software and how to develop, facing both architectural and technical aspects.
NETWORK FORENSICS & INCIDENT HANDLING
How to identify, analyse and effectively respond to threats by different kind of analysis of the network traffic defects and the systems use.
OPEN SOURCE & SOCIAL MEDIA INTELLIGENCE
Understanding of investigative techniques by analysing open sources (OSINT) and social networks (SOCMINT), moreover a special focus on the identification of the risks caused by the information overexposure.