Binary Leak Trainings

Training Offering

Original Trainings::

Ethical Hacking and Network Defense

Offering Description

Students learn how hackers attack computers and networks, and how to protect systems from such attacks, using both Windows and Linux systems. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, exploiting Windows and Linux vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.


Learning Outcomes

  • Perform port scans to locate potential entry points to servers and networks.

  • Perform very simple scripting and coding tasks, specifically oriented towards the needs of network security professionals. Locate and hack into wireless networks, and protect them.

Advanced Ethical Hacking

Offering Description

Advanced techniques of defeating computer security, and countermeasures to protect Windows and Unix/Linux systems. Hands-on labs include Google hacking, automated footprinting, sophisticated ping and port scans, privilege escalation, attacks against telephone and Voice over Internet Protocol (VoIP) systems, routers, firewalls, wireless devices, Web servers, and Denial of Service attacks.

Learning Outcomes

  • Enumerate resources on systems using banner-grabbing and specific attacks against common Windows and Unix/Linux services including FTP, Telnet, HTTP, DNS, and many others, and protect those services

  • Perform classical and modem Denial of Service (DoS) attacks, and defend networks from them

  • Locate Web server vulnerabilities, exploit them, and cure them

Open Source Intelligence Techniques

Offering Description

This course offers training on gathering information using only open source information, same way one would collect information on companies or targets when performing ethical hacking, penetration testing or investigations.

Learning Outcomes

  • Perform open investigations under freely available information ethically and perform non-invasive investigations.

Hands-On Penetration Testing

Offering Description

Hands-On penetration testing since day one. Training is oriented on going over hands-on/getting dirty practicing penetration testing on test virtual machines. Course goes over demonstration and offers challenges to be hacked by students by only providing ‘hints’.

Learning Outcomes

  • Giving the students the ability to find vulnerabilities and perform penetration test on computers. Understanding the teachings provided in Ethical Hacking courses.

Web Applications Hacking

Offering Description

Techniques used by attackers to breach Web applications, and how to protect them. How to secure authentication, access, databases, and back-end components. How to protect users from each other. How to find common vulnerabilities in compiled code and source code.

Learning Outcomes

  • Upon successful completion of this course, the student will be able to:

  • Explain the current state of Web application security

  • Analyze basic application functionality

  • Secure data stores and back-end components

  • Protect users from other users

  • Demonstrate common exploits and patch their root causes

  • Implement servers and firewalls effectively

Exploit Development

Offering Description

Learn how to find vulnerabilities and exploit them to gain control of target systems, including Linux, Windows, Mac, and Cisco. This class covers how to write tools, not just how to use them; essential skills for advanced penetration testers and software security professionals.

Upon successful completion of this course, the student will be able to:

  • Read and write basic assembly code routines

  • Read and write basic C programs

  • Recognize C constructs in assembly

  • Find stack overflow vulnerabilities and exploit them

  • Create local privilege escalation exploits

  • Understand Linux shellcode and be able to write your own

  • Understand format string vulnerabilities and exploit them

  • Understand heap overflows and exploit them

  • Explain essential Windows features and their weaknesses, including DCOM and DCE-RPC

  • Understand Windows shells and how to write them

  • Explain various Windows overflows and exploit them

  • Evade filters and other Windows defenses

  • Find vulnerabilities in Mac OS X and exploit them

  • Find vulnerabilities in Cisco IOS and exploit them

Learning Outcomes

At the end of this course, students should be able to:

  • Read and write basic assembly code routines

  • Find stack overflow vulnerabilities and exploit them

  • Evade filters and other Windows defenses

Industry Training

CompTIA

  • Security+

  • CySA+

  • Pentest+

  • CASP

CISCO

      • ICND1 & ICND2