Click Here to Register: [ Registration Coming Soon ]
Deadline: January 3, 2020
Location: WMCAT – 614 First St NW, Suite #300, Grand Rapids, MI 49504
Duration: 2 days (16 hours) | Wednesday, January 8 – Thursday, January 9 (8:30am – 4:30pm)
Delivery: This course will be taught live + remote online by a certified Merit Network instructor.
This course is accessed through the Michigan Cyber Range using the free VMWare Horizon View client.
(Participants are invited to please co-locate at WMCAT for synchronous instruction.)
Cost: $450 per person
Included: Live + remote “hands-on” instruction; digital course materials (content & labs); Certificate of Completion
Not Included: Internet access is not available inside the environment; Internet searches must be done on your host machine or elsewhere
Internet access will be provided; Participants should bring their own computer/device (BYOD).
Training Level: Novice to Beginner
Coursework: 16 hours of instruction material (content + hands-on labs)
Learning Objectives & Course Topics:
The objective for this exercise is to learn exploit methodologies and common exploitative tools.
- Types of hackers
- Hacker skills
- The hacker’s mindset
- Exploit-less exploits
- Requirements for success
- Six stages of Networked Exploitation (“Hacking”)
- Penetration testing
- Definitions and Concepts
- Networking basics
- Open source information gathering
- Social engineering
- Networked vs. physical exploitation
- Application or service vulnerability
- Password cracking
- Web application hacking
- Maintaining access
Understanding exploit methodology is proven to help Network Defenders (“Blue Teamers”) better protect networks and data. Hacking Essentials is a hands-on lab that provides understanding and insight about how to look for weaknesses and vulnerabilities in target systems. This lab-based training class shows you how to use the same knowledge and tools as a malicious hacker, including (but not limited to): Armitage, Metasploit, and Password Cracking.
This live + online 2-day class helps you learn basic cyber skills and is taught with a combination of lecture, demonstration, and access to an individual Secure Sandbox. The Secure Sandbox includes 8 lab exercises with your own set of VMs that are safe for exploring new tools. This training provides the student with a hands-on, realistic, and immersive experience to learn the latest open source ethical hacking techniques.
Hacking Essentials takes place in Alphaville — the Michigan Cyber Range’s virtual training environment — which mimics a real city and offers five different locations, each representing a different security level and containing systems similar to their real-world counterparts. The environment features SCADA, security appliances, email, file sharing, active directory, and DNS.
There is no exam at conclusion of this lab; however, a Certificate of Completion is provided at the end of training.
- Lab 1: Information Gathering with nslookup and WHOIS
- Lab 2: Open Source Information Gathering
- Lab 3: Active System Reconnaissance with nmap
- Lab 4: Active System Reconnaissance with zenmap
- Lab 5: Banner Grabbing
- Lab 6: Metasploit Fundamentals
- Lab 7: Metasploit Database
- Lab 8: Exploitation with Armitage
Who Should Attend?
People looking to enter into the Cybersecurity field or learn common hacking techniques to better defend networks; Network Defense (“Blue Team”) professionals looking to expand their hacking (“Red Team”) skills/exploit knowledge.
Common job titles for participants:
Auditors, Site Administrators, Security Professionals, Security Officers, and anyone who is concerned about the integrity of a networked data infrastructure.
Basic system administration, basic exposure to Linux, and basic computer knowledge.