Whenever you are developing an application or just writing code, you have to do extensive testing, not only for the straight forward test cases, but also for the cases that may lead to vulnerabilities in your system. If there is one way to make the application work, you have to think of the infinity - 1 ways that will make the application stop. In this course, we will have a deep overview about the hacking theories and practical techniques in order to be able to accomplish several hacking attempts. Since this course will be delivered online, we will be using online hacking tools that work on any desktop regardless of the setup and regardless of the operating system.
At the end of this course, participants will be able to: Learn what is ethical hacking, its fields and the different types of hackers
2
Install hacking lab & needed software (works on Windows, OS X and Linux)
3
Hack & secure both WiFi & wired networks
4
Discover vulnerabilities & exploit them hack into servers
5
Hack secure systems using client-side and social engineering attacks
IBM
Online courses from IBM. IBM is the global leader in business transformation through an open hybrid cloud platform and AI, serving clients in more than 170 countries around the world. Today 47 of the Fortune 50 Companies rely on the IBM Cloud to run their business, and IBM Watson enterprise AI is hard at work in more than 30,000 engagements. IBM is also one of the world’s most vital corporate research organizations, with 28 consecutive years of patent leadership. Above all, guided by principles for trust and transparency and support for a more inclusive society, IBM is committed to being a responsible technology innovator and a force for good in the world. For more information about IBM visit: www.ibm.com. Digital Skill Badges are now available in ALL IBM courses on edX. In addition to receiving an edX verified certificate, learners who successfully complete any IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in the course. Enroll in any IBM course today to learn more, complete the course and claim your badge.
Course Outline
Part 1
Module 1: History of Cybersecurity
This module will give you a brief overview of the history of cybersecurity. You will also learn key terms and roles in cybersecurity.
Module 2: A brief overview of types of actors and their motives
This module will provide you with a brief overview of the types of actors and their motives. You will also understand different types of attacks and their impact on an organization and individuals. You will also learn about tools that are available to you to assist in any cybersecurity investigation. Introduction to Ethical Hacking and Cyber Security | Theory What are the various types of hackers | Theory Introduction to Kali Linux | Lab Why Kali Linux is considered the best operating system for hacking | Theory What are the best built-in tools in Kali Linux for hacking | Lab
Part 2
Module 3: An overview of key security concepts
This module will describe various key security concepts that are important in any cybersecurity position. The CIA Triad will be further explained. You will also begin to learn the significance of incident response and frameworks around cybersecurity. Finally, you will get an overview of IT Governance best practices and compliance.
Module 4: An overview of key security tools.
In this module, you will be introduced to key security tools including firewalls, anti-virus, and cryptography. What is SQL Injection | Theory Dangers of SQL Injection Vulnerabilities | Theory Bypassing Logins Using SQL injection Vulnerability | Lab What is SQLMap and how is it used? | Lab Reading Database Information | Lab Finding Database Tables | Lab Extracting Sensitive Data Such As Passwords | Lab
Part 3
What is Phishing? | Theory<br/>Why is it used? | Theory<br/>Can you differentiate between these 2 websites? (One is normal, and one is phishing) | Lab<br/>What do we need to create a phishing page? | Lab<br/>What is Social Engineering? What is SE Toolkit and how is it used? | Lab<br/>We will use this tool to learn how to spot a phishing website: https://phishingquiz.withgoogle.com/ We will use the real code of the login page of Google accounts (Gmail) and we will host it on a free server which is 000webhost.com. We will modify the code to convert the initial login page of Gmail to a phishing page
Part 4
What is Network Sniffing? | Theory<br/>What is Password Sniffing? | Theory<br/>What are the tools used to steal passwords by sniffing packets? | Lab<br/>Can we steal passwords on HTTPS websites or only HTTP? | Lab<br/>We will ask the participants to download WireShark on their computers to sniff packets on the network.<br/>After that, we will use an Online website called Caisis.org/demo. This is a non secure website. We will login on this website, and we will go to WireShark and filter the packets and we will see the username and password that we entered
Part 5
Understanding the concept of Password Cracking | Theory<br/>Why and how are passwords cracked? | Lab<br/>What is Encryption and Decryption? | Lab<br/>First, we will use a website called PasswordMeter.com to check the strength of our password<br/>Then, we will use an official website from Kaspersky called Password.Kaspersky.com to check how much time it needs for our password to by cracked<br/>Then, we will use the best online tool for Encryption and Decryption called cryptii.com<br/>At the end, we will ask the participants to install Cain and Abel, and then we will create a new user on our computer and see how we can crack its password
Part 6
What is the concept behind Viruses? | Theory<br/>How are they made? What are the various purposes of Viruses? | Theory<br/>How are they transmitted? | Lab<br/>What’s the difference among a Virus, Trojan and Worm | Lab<br/>How to send fake emails from trusted addresses like [email protected] | Lab<br/>We will create our own Virus with a purpose to harm the computer of the victim by disabling all antiviruses first then deleting all his files. Then, we will learn how to hide the virus by appending it to an image, and sending it to the victim using a Fake Email
Part 7
What is cross site scripting? | Theory<br/>How does it become harmful and how to take advantage of it? | Lab<br/>What are the various vulnerabilities that can be exploited using Cross Site Scripting? | Lab<br/>First, we will use an online website called https://www.hacksplaining.com/exercises/xss-stored to simulate the concept of XSS hacking<br/>After that, we will use an online hacking game developed by Google called https://xss-game.appspot.com/ to teach us how to exploit Cross Site Scripting vulnerabilities<br/>What is DDOS? How does it work? | Theory<br/>Why do hackers use DDOS? | Lab<br/>Understanding IP addresses and SubNet Masks to prevent specific IP attacks | Lab
Part 8
We will use a website called https://www.hacksplaining.com/exercises/denial-of-service-attacks to simulate the DDOS attack on a server and learn how to use IP calculations and Subnet masks to block a range of IPS<br/>Understanding Security Operations Center | Theory<br/>What are the components of a Security Operations Center | Lab<br/>Why do we need it and how it can help us | Lab<br/>Understanding Incident Management | Theory<br/>What are the steps that we need to follow for an excellent Incident Response | Theory<br/>What is Digital forensics and how to investigate Forensic cases | Lab<br/>We will use the Hacksplaining.com website to simulate real-life hacking attempts of Password Mismanagement, Clickjacking, and Email spoofing. After that, we will learn how to behave when we receive similar requests
Final Project
At the end of the course, the trainer summarizes all the material explained during the previous days and focuses on the most important points which are applicable in our daily life. Later, the trainer splits the class into several groups (teams) and distributes the final project which is a simulation of real-life tasks and challenges. Every team starts applying what is requested in the final project. Meanwhile, the trainer passes through team members and tries to help them in case of any difficulty faced. At the end of the day, every team should present his final work in front of the class and an open discussion is held to assess the work.
Who Should Attend?
This highly practical and interactive course has been specifically designed for
This course is relevant for senior managers and executives who are involved in crafting cybersecurity strategies and leading digital transformation program for their companies.
It is equally useful for anyone who wants to learn about cybersecurity and how can technology create value in their profession today.
FAQ
What language will the course be taught in and what level of English do I need to take part in a LEORON training program?
Most LEORON courses are delivered in English. However, there are some courses offered in Arabic, mainly online. For our in-house courses, sessions can be curated and delivered in any language upon request. In general, the best way to confirm language availability is to check with our Enrollment Managers for the most up-to-date information. Simply click on “Let’s talk on WhatsApp” to chat with us directly.
What formats are the courses offered in?
LEORON delivers training in various formats including face-to-face, live virtual sessions, self-paced learning, in-house delivery as well as online courses.
Are LEORON Public courses certified by an official body/organization?
Yes, most LEORON public courses are accredited by internationally recognized bodies such as CIPD, ATD, PMI, EdEx, and many others—depending on the course.
Who accredits LEORON’s training programs?
LEORON partners with over 20 international bodies such as PMI, CIPD, ATD, EdEx, NASBA, CISI, GARP, HRCI, SHRM, ACCA, ASQ, IIA, ILM, IAC, and others
Are CPD points or PDUs provided?
Yes, learners can earn CPD credits and professional development units (PDUs) including NASBA CPEs, PMI PDUs, CISI, GARP, HRCI, SHRM, and more.
How can I register for a course?
You can register through our website by filling in the inquiry form, or by speaking directly with one of our consultants via WhatsApp or email. Once we confirm your interest, we’ll guide you through the steps.
When is the registration deadline for public courses?
Registration typically closes 14 days before the course start date, with occasional late registrations accepted upon confirmation
What is included in the course fee?
The fee generally covers 5-star venue facilities, training materials, certified instruction, lunches and refreshments, plus certification and membership where applicabl0065
Are there group rates or discounts?
Yes, group bookings and corporate-level discounts are available. Learners are encouraged to reach out to discuss specific arrangements
What support is available with registration?
Enrollment Managers and a Registration Desk assist with the entire process, including deadlines, travel logistics, and course customization. As well as any other special requests you might have. Simply to go your preferred course and click on “Let’s chat on WhatsApp” to do so.
Can I request a bespoke course at my location or within my organization?
Yes, in-house training is fully customizable in terms of curriculum, language, delivery, and timing. You can suggest dates and locations. Simply to go your preferred course and click on “Let’s chat on WhatsApp” in order to address any questions or concerns in this regards.
What is the refund or cancellation policy?
Refund and cancellation policies vary depending on the course type and location. Generally, cancellations made at least 14 days before the course start date may be eligible for a full or partial refund, while cancellations made closer to the course date may incur a fee. For exact terms, please consult your Enrollment Manager or refer to the course confirmation email.
Can I register multiple employees from my company?
Yes. We support group registrations and offer corporate packages for organizations enrolling multiple participants. Our team can help coordinate the logistics for group bookings.
Who should attend these courses?
LEORON caters to a variety of professionals: from those seeking leadership development to project managers, HR specialists, finance professionals, cybersecurity, procurement, Ai enthusiasts and many others.
Do I need prior experience or academic qualifications?
Not always. Many specialized paths, like cybersecurity, accept learners without prior experience. However, some courses (e.g., PMI PDU-based ones) may have recommended prerequisites. Its always better to chat with one of our Enrollment Managers to discuss more. Simply to go your preferred course and click on “Let’s chat on WhatsApp” to do so.
Will I receive a certificate after completing the course?
Yes. Upon full attendance and successful completion, you will receive a certificate of participation or accreditation, depending on the course.
Are meals and refreshments included in face-to-face courses?
Yes. For in-person courses, lunch and coffee breaks are provided daily at the venue.
Can LEORON deliver a course in-house at our organization?
Absolutely. All programs can be delivered privately at your company or virtually for your team, customized to match your internal goals and structure.
Reviews
Review:
IAMM Internal Audit Maturity Model
In recognition of their dedication and contribution supporting IKEA Saudi Arabia in arranging training programs during 2017 & 2018, looking forward for more development and exciting effort this year. On behalf of IKEA Saudi Arabia, THANK YOU!
Dalal Kutbi
Review:
Certified Professional in Quality and Patient Safety
Dating back to 2014, Mobily’s “LEORON” experience has grown from a single collaboration to a long-term partnership. We consider “LEORON” Institute as a strategic partner, whose contribution has been nothing but premium in equipping our staff with field-based knowledge and information. Past three years have resulted with an expanded collaboration with superior customer service and support. Best Regards,
Turki S. Alsahaan
Review:
Certified Professional in Quality and Patient Safety
Since the partnership was signed between BAE Systems Saudi Development & Training and LEORON in 2017, we have been working together to offer the Saudi market a complete portfolio of training solutions benefiting from the wide and extensive experience of both parties. Recognizing the great success of this partnership, we are looking for further collaborations in the future that will position both companies as one of the leading training providers in Saudi Arabia. We thank the LEORON team for their full cooperation and continuing support, and look forward to further success together in the years to come.
Emad Alrajih
Review:
Certified Professional in Quality and Patient Safety
We have been working with LEORON for the past two years and will be working with them again this upcoming year. The programs they delivered were fruitful and exciting and our organization has received positive feedback from the participants. What our organization aims to do is to provide at no cost training for all the private sector employees so that they may benefit from our offered programs in Innovation and Professional development. LEORON has helped us achieve this goal. We look forward to continuing this service and wish them the best of luck. Regards,