Pure Hacking: The Tutorial is a highlights package from existing course offerings that provide intensive, hands-on training. Participants will learn how hackers think and act. They learn how hackers can gain methodically gain entry in to an organisations information systems to steal information. The intent of this course is to assist organisations in arming front line staff with the approach, the latest tools and techniques that attackers utilise so that they can better secure there organisations IT environment. Pure Hacking believe they are in a very good position to provide the tutorial as day in day out they are discovering the latest attack techniques to utilise in penetration testing for our client base during the work we perform for them. -Why attend this tutorial? To gain an understanding of an approach to performing penetration testing As tools and techniques to attack infrastructure are becoming easier to use and more widely available allowing less sophisticated attackers to compromise complex environments. To obtain knowledge and training to assist in defending your organisation against attack. To learn and understand this constant threat to business. -Who should attend? System Administrators, Information Security Specialists, Security Administrators and Analysts, Security Testers, Internal Auditors -What will they learn? A high-level understanding of a methodology for penetration testing A hands on approach for effective penetration testing Controls and countermeasures Leading practices in testing approaches for various technology types Assistance in thinking outside the box. The tutorial will include modules covering the essentials of penetration testing and the various technologies commonly utilised in most organisations. This tutorial will provide a brief overview of: Which tools to use How to use the tools, and most importantly The methodology behind security testing. The tutorial will allow a student to understand the knowledge required for a person to be considered a capable, resourceful, and self-sufficient security tester. Course Outline The course is compromised of the following modules and concludes with a two-hour lab simulating an organisation to compromise. Module 1: Understanding security testing Module 2: The Methodology Module 3: Developing an attack server in Linux & Windows Module 4: Windows lienetration Testing Module 5: Unix lienetration Testing Module 6: Miscellaneous Technologies (VOIP, Wireless, Network Protocols etc.) LAB: The course will then have a two-hour lab simulating the above technologies allowing students to test the skills in which they learnt in the morning to compromise some of the technologies and tools demonstrated during the course of the day.