Skip to content

Ethical Hacking Advanced

IN ENGLISH

This training will elevate your ethical hacking skills to the next level. You will learn to identify and exploit web app vulnerabilities, breach systems behind firewalls, and launch attacks with powerful tools. Hands-on exercises will give you a great foundation to start learning advanced skills in the art of hacking.  

Read more Schedule

See also:

Eettinen hakkerointi

 

SIGN UP

 

Choose the most suitable day.

You’ll receive a -10% group discount for teams of 3 or more.

Stay one step ahead of the attackers. 

The Ethical Hacking Advanced -training offers you hands-on experience on advanced tools and techniques on exploitation. You will understand the web applications more in detail, learn how to use tools to identify and exploit them and know how to select the correct attack methods.

Through immersive, real-world simulations, you’ll develop proficiency in penetration testing methods, utilizing a framework favored by seasoned hackers. This training crafted to provide hands-on experience, ensuring that you not only learn but internalize these crucial skills.

For whom is the training suited?

The training is suitable for anyone interested in advanced hacking methods. Especially system admins, software developers and security personnel of organizations will gain methods to protect and test the security of their networks and applications.  

To get the most out of the workshop, some prior experience in security is advisable. Understanding Kali Linux and working with command line interface will help during the exercise work. 

Reminder for attendees

Remember to have your computer with you. Make sure that you have permission to install virtualization software and Kali Linux on your computer.

UNDERSTAND

the various vulnerabilities present in web applications

GAIN

proficiency in using popular penetration testing frameworks to assess and exploit vulnerabilities.

DISCOVER

methods to gain unauthorized access to systems and networks protected by firewalls

EXPLORE

how to launch attacks on servers and backend systems using powerful tools

Schedule.

  • 1. DAY
  • 8.30
  • Welcome! Enrollment and coffee in Keilaranta.
  • 9.00
  • Brief introduction to the workshop
  • Overview of basic ethical hacking concepts and the previous workshop.  
  • What advanced techniques can be used in ethical hacking?  
  • How to work with penetration testing framework?  
  • 9.30
  • The art of intruding web applications
  • How to change your viewpoint?  
  • What goes beyond the user interface? Web application reconnaissance.  
  • How to exploit the client-side functionality?  
  • Exercise: Client-side vulnerability exploitation  
  • 10.30
  • Break
  • 10.45
  • Digging deeper into the web application hacking
  • How to classify web application attacks?  
  • Understanding and attacking the web application’s internal interfaces.  
  • How to gain access to user accounts?  
  • Exercise: Attacking authentication and session management.  
  • 12.00
  • Lunch break
  • 13.00
  • Cracking the web application’s backend systems
  • How to steal information from the backed systems?  
  • What methods there are available for stealing information?  
  • Exercise: Injection attacks and insecure direct object reference attacks  
  • 14.15
  • Break
  • 14.30
  • Working with penetration testing framework
  • Unleashing the power of accumulated knowledge in the form of exploitation framework. 
  • Understanding exploitation methods and post exploitation using Metasploit framework.
  • Exercise: Exploiting and gaining access to systems with Metasploit.
  • 15.30
  • Summary of what was learned
  • 16.00
  • The end of day 1

  • 2. DAY
  • 8.30
  • Welcome! Enrollment and coffee in Keilaranta.
  • 9.00
  • Exploiting and extracting information
  • How to create backdoor connections behind the firewalls and gain access?  
  • How to lure victims using emails? 
  • Local and post exploitation methods. 
  • Exercise: Post exploitation and securing access with Metasploit
  • 10.30
  • Break
  • 10.45
  • Art of crafting modified backdoors
  • How to avoid virus detection
  • Creating backdoors with MSFVenom
  • Exercise: Create backdoor using modified exploit payload
  • 12.00
  • Lunch break
  • 13.00
  • Capture the Flag competition!
  • Use the skills you have learned and steal the flag before others.  
  • Hints will be given during the competition.  
  • 15.30
  • Summary of the workshop
  • How to improve your skill further 
  • 16.00
  • Thank you! The training ends

Trainer.

Internationally acclaimed cyber security expert & trainer

Kimmo Sauren

Kimmo works as the Head of Degree Programme for the Smart IoT program at Metropolia University of Applied Sciences. His expertise spans broadly across information technology, telecommunications engineering, and cyber security, accumulated through both teaching assignments and software development roles. Kimmo has taught both domestically and internationally.

Courses on cyber security and hacking taught by Kimmo are available at several European universities, and he has participated in teaching assignments internationally across multiple countries. Kimmo’s professional passion lies in constructing a logical framework for the subject matter at hand, which is easily understandable. Supporting the learning process with engaging practical exercises is an essential aspect of his professional teaching approach.

Internationally acclaimed cyber security expert & trainer

Kimmo Sauren

Kimmo works as the Head of Degree Programme for the Smart IoT program at Metropolia University of Applied Sciences. His expertise spans broadly across information technology, telecommunications engineering, and cyber security, accumulated through both teaching assignments and software development roles. Kimmo has taught both domestically and internationally.

Courses on cyber security and hacking taught by Kimmo are available at several European universities, and he has participated in teaching assignments internationally across multiple countries. Kimmo’s professional passion lies in constructing a logical framework for the subject matter at hand, which is easily understandable. Supporting the learning process with engaging practical exercises is an essential aspect of his professional teaching approach.

SUPER EARLY BIRD

Public sector: 925 €
Private sector: 1245 €
Valid until 15.3.2024.
osta liput

EARLY BIRD

Public sector: 975 €
Private sector: 1345 €
Valid until 12.4.2024.
osta liput

NORMAL PRICE

Public sector: 1025 €
Private sector: 1545 €
Valid until 14.5.2024.
osta liput

Update for the whole team?

Wisdom is strengthened in a group! Always -10% group discount for teams of at least 3 people or more. Sign up through our online store, ask for a group offer at ryhmatarjous@upload.fi or call 040 655 1855 – we’ll be happy to help.

Sign up

Others also bought.

Info.

Do you have any other questions? Find answers to frequently asked questions here.

Version 2.0 of you is always guaranteed

–regardless of how the training is carried out: remotely via the internet, in person, or in a hybrid format.

The implementation method has been shaped to be adaptable to all modes of instruction, and interactivity has not been overlooked. A modern technical implementation and the expertise of trainers guarantee real-time and interactive interaction between both the trainer and participants – regardless of the mode of training delivery.

Easy to reach, even by boat ⚓️

Keilaranta 1 A, 02150 Espoo

Keilaranta 1 Business Park is located by the sea in Keilaniemi, Espoo, close to the core of Helsinki. The West Metro station and taxi stand are right across from the property, and there are plenty of parking spaces available for cars. For those in Espoo, arriving by sailboat is also an option 😊

How to arrive