Course Overview
Cyber security, attack techniques and countermeasures
Learn the latest techniques used by hackers and how to effectively defend against advanced attacks. In a time of limited security budgets, staff shortages and strict security standards, our workshop provides IT administrators, security officers and SOC analysts with the guidance they need.
Among other things, our workshop covers specific attack techniques for Linux and Windows, authentication processes, web and cloud security as well as methods for defending against ransomware and protecting infrastructures. The hands-on exercises are based on the prestigious Mitre ATT&CK project and actual attacks observed at customer sites. The theoretical part is based on industry standards such as the BSI baseline protection compendium and the CIS benchmarks and continuously integrates new content from security vendor reports, conference talks, news feeds, research papers and technical blogs.
In the course, we consistently switch between the perspective of the attacker and the defense. This enables participants to derive defense measures and quick wins directly from the practical lab exercises. Equip your organization with the knowledge to fend off 0-day and 1-day attacks and meet the requirements of the GDPR and NIS2 regulations.
The course is rounded off with advanced topics such as antivirus evasion, next-generation firewalls, XDRs, proxy whitelisting, sandboxes, EDRs and XSS filters. A special feature of our course compared to other basic cyber security courses and certification courses is that we do not dwell on outdated basics and attack techniques that are irrelevant today, but focus on the really important topics. We also provide space for questions that go beyond the course content.
At the end of the course, we take 30 minutes for an Ask Me Anything
(AmA) to facilitate a discussion between the participants and the trainer. This provides an opportunity to talk about current projects and topics that are relevant to the participants but were not covered in the course.
Lab
The lab environment includes a powerful, fully dedicated lab per participant with more than 35 virtual cores and over 80 GB of RAM. The lab environment has a large bandwidth and low latency. It is accessed via a web browser and does not require any software to be installed.
Bonus
As a bonus, after completing the 4-day Cyber Security & ANTI-HACKING workshop, you will receive an additional day of full access to the hacking lab presented in the course. This additional day gives you the opportunity to deepen the attack techniques discussed and to independently get to know further attack scenarios in the lab. The exercises require creativity, technical knowledge and tenacity. You will also have time to repeat the exercises discussed in the course.
Who should attend
This beginner's course is aimed at IT security officers, IT administrators (client, server, network), programmers, IT engineers and Security Operation Center (SOC) operators as well as anyone who wants to view security risks from the perspective of the attacker and thus develop solution scenarios.
Prerequisites
- Experience with the operation and administration of IT systems
- Basic IT security knowledge
Course Objectives
The aim of the course is to impart technical and organizational knowledge in the field of IT security so that participants can make sensible decisions in their daily work to improve IT security efficiently and sustainably. Numerous practical exercises will enable you to recognize and ward off attacks or to close or reduce existing security gaps.
Course Content
- Basics of cyber security
- Current trends
- Initial infection
- Infrastructure security
- Linux attacks
- Windows attacks
- Post-exploitation
- Active Directory
- Post Exploitation
- Defense in Depth
- Ransomware
- Ask me Anything
- Web Security
- Denial of Service
- Network Security