{"id":5491,"date":"2021-09-07T14:38:03","date_gmt":"2021-09-07T14:38:03","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5491"},"modified":"2021-09-07T16:18:02","modified_gmt":"2021-09-07T16:18:02","slug":"security-training","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5491","title":{"rendered":"Security Training"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5491\" class=\"elementor elementor-5491\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-29cd273b ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"29cd273b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-11ca0468 ot-flex-column-vertical\" data-id=\"11ca0468\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1de84972 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"1de84972\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-3495a84c ot-flex-column-vertical\" data-id=\"3495a84c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-34dec5bf elementor-widget elementor-widget-text-editor\" data-id=\"34dec5bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-2254 alignleft\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/cycle.png\" alt=\"\" width=\"574\" height=\"228\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/cycle.png 574w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/cycle-300x119.png 300w\" sizes=\"(max-width: 574px) 100vw, 574px\" \/>To beat a hacker, think like a hacker\u00a0Are you a chief information security officer, security architect or a DevOps developer\u00a0that would like to understand how cyber criminals are viewing your environment?\u00a0Are you interested in finding out about the types of tools they\u2019re likely to use to\u00a0infiltrate your network?\u00a0<\/p><p>Do you need to analyze penetration forensic tests to quickly discern the difference between critical and non-critical threats so you are better informed to take the right\u00a0protective measures faster?\u00a0If so, our unique hands-on, hacking security training will benefit you greatly.<\/p><p>DataSecure offers a unique hands-on introduction to penetration testing and how to\u00a0be on the offensive when it comes to the security of your organization. This course is\u00a080% practical and you will perform actual hacking on a virtual company.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-275ce537 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"275ce537\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-23ffd0f4 ot-flex-column-vertical\" data-id=\"23ffd0f4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7e811ffb elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"7e811ffb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-18bf4708 ot-flex-column-vertical\" data-id=\"18bf4708\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b521576 elementor-widget elementor-widget-text-editor\" data-id=\"3b521576\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>What will I learn?<\/strong><\/h4><p>While we will cover a wide range of security topics, it is not designed to teach\u00a0everything. The aim is to provide you with enough baseline knowledge so you can\u00a0continue learning more about ethical hacking.<\/p><p>The following topics are covered:<\/p><ul><li>Information Gathering<\/li><li>Exploits &amp; Buffer Overflows<\/li><li>Local Privilege Escalation<\/li><li>Password Attacks<\/li><li>Client-Side Attacks<\/li><li>Pivoting &amp; Tunneling<\/li><li>Web Application Attacks<\/li><li>Domain Privilege Escalation<\/li><li>Wireless Attacks<\/li><\/ul><p>Training is hands-on where you learn the initial information and then put it to use in\u00a0a simulated target networ<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-64b4cf7c ot-flex-column-vertical\" data-id=\"64b4cf7c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cdb97d8 elementor-widget elementor-widget-image\" data-id=\"cdb97d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"420\" height=\"332\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/image008_1.png\" class=\"attachment-large size-large wp-image-2255\" alt=\"\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/image008_1.png 420w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/image008_1-300x237.png 300w\" sizes=\"(max-width: 420px) 100vw, 420px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>To beat a hacker, think like a hacker\u00a0Are you a chief information security officer, security architect or a DevOps developer\u00a0that would like to understand how cyber criminals are viewing your environment?\u00a0Are you interested in finding out about the types of tools they\u2019re likely to use to\u00a0infiltrate your network?\u00a0 Do you need to analyze penetration forensic [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5491","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5491"}],"version-history":[{"count":7,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5491\/revisions"}],"predecessor-version":[{"id":5499,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5491\/revisions\/5499"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}