We all know that hacking is illegal! It can ruin computer systems and the hacker’s life if he’s caught. But, hacking can be legal when used with permission and with the intent to protect systems from the harm that can be caused by black hat hackers. This is what we call “Ethical Hacking”! Corporations and infrastructures give permission to white hat hackers to hack into their systems and find out vulnerabilities that make them a target for cyber-attacks. “Ethical Hacking” is a preventing method in CyberSecuity and it’s not that much of a choice.
Orange Developer Center organizes Fundamentals and Practical workshops about “Ethical Hacking”, Saturday 21st September and Saturday 28th September, from 9 am to 2 pm. The two workshops will be animated by Chiheb Chebbi, Computer Science Engineer.
Take a look at the agenda and fill in the form below to reserve your spot :
Workshop 21st September: Learn Ethical Hacking fundamentals
This training course provides a good starting point from which to learn ethical hacking and identify threats and vulnerabilities to secure your IT environment. We'll begin by introducing you to the essential fundamentals to get you started with ethical hacking. Next, we'll introduce you to a basic hacking technique: reconnaissance.
You'll get hands-on experience working with Metasploit and testing the effectiveness of different defenses.
Workshop 28th September: Hands-on Penetration Testing
This training starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore different hacking techniques. Moving on, you will discover how to gain access to remote computer systems using client-side and server-side attacks. You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised. Towards the end of the training, you will be able to pick up web application hacking techniques.
The attacks covered are practical techniques that work against real systems and are purely for educational purposes. At the end of each topic, you will learn how to detect, prevent, and secure systems from these attacks.