Binary Leak Trainings
Training Offering
Original Trainings::
Ethical Hacking and Network Defense
Offering Description
Students learn how hackers attack computers and networks, and how to protect systems from such attacks, using both Windows and Linux systems. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, exploiting Windows and Linux vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.
Learning Outcomes
Perform port scans to locate potential entry points to servers and networks.
Perform very simple scripting and coding tasks, specifically oriented towards the needs of network security professionals. Locate and hack into wireless networks, and protect them.
Advanced Ethical Hacking
Offering Description
Advanced techniques of defeating computer security, and countermeasures to protect Windows and Unix/Linux systems. Hands-on labs include Google hacking, automated footprinting, sophisticated ping and port scans, privilege escalation, attacks against telephone and Voice over Internet Protocol (VoIP) systems, routers, firewalls, wireless devices, Web servers, and Denial of Service attacks.
Learning Outcomes
Enumerate resources on systems using banner-grabbing and specific attacks against common Windows and Unix/Linux services including FTP, Telnet, HTTP, DNS, and many others, and protect those services
Perform classical and modem Denial of Service (DoS) attacks, and defend networks from them
Locate Web server vulnerabilities, exploit them, and cure them
Open Source Intelligence Techniques
Offering Description
This course offers training on gathering information using only open source information, same way one would collect information on companies or targets when performing ethical hacking, penetration testing or investigations.
Learning Outcomes
Perform open investigations under freely available information ethically and perform non-invasive investigations.
Hands-On Penetration Testing
Offering Description
Hands-On penetration testing since day one. Training is oriented on going over hands-on/getting dirty practicing penetration testing on test virtual machines. Course goes over demonstration and offers challenges to be hacked by students by only providing ‘hints’.
Learning Outcomes
Giving the students the ability to find vulnerabilities and perform penetration test on computers. Understanding the teachings provided in Ethical Hacking courses.
Web Applications Hacking
Offering Description
Techniques used by attackers to breach Web applications, and how to protect them. How to secure authentication, access, databases, and back-end components. How to protect users from each other. How to find common vulnerabilities in compiled code and source code.
Learning Outcomes
Upon successful completion of this course, the student will be able to:
Explain the current state of Web application security
Analyze basic application functionality
Secure data stores and back-end components
Protect users from other users
Demonstrate common exploits and patch their root causes
Implement servers and firewalls effectively
Exploit Development
Offering Description
Learn how to find vulnerabilities and exploit them to gain control of target systems, including Linux, Windows, Mac, and Cisco. This class covers how to write tools, not just how to use them; essential skills for advanced penetration testers and software security professionals.
Upon successful completion of this course, the student will be able to:
Read and write basic assembly code routines
Read and write basic C programs
Recognize C constructs in assembly
Find stack overflow vulnerabilities and exploit them
Create local privilege escalation exploits
Understand Linux shellcode and be able to write your own
Understand format string vulnerabilities and exploit them
Understand heap overflows and exploit them
Explain essential Windows features and their weaknesses, including DCOM and DCE-RPC
Understand Windows shells and how to write them
Explain various Windows overflows and exploit them
Evade filters and other Windows defenses
Find vulnerabilities in Mac OS X and exploit them
Find vulnerabilities in Cisco IOS and exploit them
Learning Outcomes
At the end of this course, students should be able to:
Read and write basic assembly code routines
Find stack overflow vulnerabilities and exploit them
Evade filters and other Windows defenses
Industry Training
CompTIA
Security+
CySA+
Pentest+
CASP
CISCO
ICND1 & ICND2