Cyber Security & Protection Workshop English English

day 1

Information Security and Data Protection

    • Kick off
    • Physical and information security
    • Username, password, MFA, access and authorisation
    • Patching
    • Encryption
    • HW/SW Configuration
    • Backup, duplication, recovery
Cyber Security and Protection: Information Security and Data Protection illustration

Checks

    • RACI, training
    • Logging
    • Penetration testing (Red, Blue and Purple team)
    • Attestation
    • Type of Audits
Cyber Security and Protection: Checks illustration

Security Breach

    • Phishing (spam, e-mail phishing, smishing, vishing, pharming)
    • Malware, vulnerability, exploit
    • Intranet, internet, VPN, cloud, deep net, dark net, RaaS
    • White, gray and black hat hacker
    • Incident: intrusion and security breach
Cyber Security and Protection: Security Breach illustration
day 2

PenTest: Planning and Scoping

    • Importance of scoping
    • Legal concepts
    • Defining scope and objectives
    • Compliance-based assessment
Cyber Security and Protection, PenTest: Planning and Scoping illustration

PenTest: Information Gathering and Vulnerabilities

    • OSINT
    • Information Gathering techniques
    • Vulnerability scanning
    • Analyzing vulnerability scan results
    • Evaluating and ranking vulnerabilities
    • Weaknesses related to specialized systems
Cyber Security and Protection, PenTest: Information Gathering and Vulnerabilities illustration
day 3

PenTest: Attacks and Exploits

    • Social engineering techniques
    • Exploiting network vulnerabilities
    • Wireless and RF vulnerabilities
    • Exploiting application vulnerabilities
    • Exploiting local machines vulnerabilities
    • Attack of security of physical facilities
    • After exploit activities
Cyber Security and Protection, PenTest: Attacks and Exploits illustration

PenTest: Testing Tools

    • Penetration Testing Tools
    • Analyze tool output related to a penetration test
    • Basic scripting knowledge
Cyber Security and Protection, PenTest: Testing Tools illustration
day 4

PenTest: Hands-on Labs

    • Click jacking
    • OSINT
    • netcat, nmap
    • Password cracking
    • Social engineering techniques
Cyber Security and Protection, PenTest: Hands-on Labs illustration

PenTest: Report Writing and Best Practices.

    • Data normalisation
    • Post-report delivery activities
    • Mitigation strategies for discovered vulnerabilities
    • The importance of communication during the penetration testing process
Cyber Security and Protection, PenTest: Report Writing and Best Practices illustration

Summary

    • Q&A
    • Wrap up
Cyber Security and Protection: Summary illustration
BAHACO GDPR AI Cloud Ltd.
Address: 1/3 Tulipán utca, Pápa, 8500, Hungary
E-mail: workshop [at] bahaco.hu
Internet: https://www.bahaco.eu
VAT number: 28809355-2-19
Companies Court Nr.: 19-09-521486
Logo
Workshop