<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="34890" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/innovator-hack" lastchanged="2025-09-03T09:21:17+02:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Cyber Security &amp; ANTI-HACKING Workshop</title><productcode>HACK</productcode><vendorcode>IC</vendorcode><vendorname>Innovator Class</vendorname><fullproductcode>IC-HACK</fullproductcode><version>8.2</version><objective>&lt;p&gt;The aim of the course is to impart technical and organizational knowledge in the field of IT security so that participants can make sensible decisions in their daily work to improve IT security efficiently and sustainably. Numerous practical exercises will enable you to recognize and ward off attacks or to close or reduce existing security gaps.&lt;/p&gt;</objective><essentials>&lt;ul&gt;
&lt;li&gt;Experience with the operation and administration of IT systems&lt;/li&gt;&lt;li&gt;Basic IT security knowledge&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;This beginner&amp;#039;s course is aimed at IT security officers, IT administrators (client, server, network), programmers, IT engineers and Security Operation Center (SOC) operators as well as anyone who wants to view security risks from the perspective of the attacker and thus develop solution scenarios.&lt;/p&gt;</audience><contents>&lt;ul&gt;
&lt;li&gt;Basics of cyber security&lt;/li&gt;&lt;li&gt;Current trends&lt;/li&gt;&lt;li&gt;Initial infection&lt;/li&gt;&lt;li&gt;Infrastructure security&lt;/li&gt;&lt;li&gt;Linux attacks&lt;/li&gt;&lt;li&gt;Windows attacks&lt;/li&gt;&lt;li&gt;Post-exploitation&lt;/li&gt;&lt;li&gt;Active Directory&lt;/li&gt;&lt;li&gt;Post Exploitation&lt;/li&gt;&lt;li&gt;Defense in Depth&lt;/li&gt;&lt;li&gt;Ransomware&lt;/li&gt;&lt;li&gt;Ask me Anything&lt;/li&gt;&lt;li&gt;Web Security&lt;/li&gt;&lt;li&gt;Denial of Service&lt;/li&gt;&lt;li&gt;Network Security&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;h5&gt;Cybersecurity basics&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;What is hacking?&lt;/li&gt;&lt;li&gt;What is IT security?&lt;/li&gt;&lt;li&gt;Attackers, motivation and tactics&lt;/li&gt;&lt;li&gt;General definitions and metrics&lt;/li&gt;&lt;li&gt;Attack techniques and tactics according to Mitre Att&amp;amp;ck&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Current trends&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Current metrics&lt;/li&gt;&lt;li&gt;Proven attack techniques&lt;/li&gt;&lt;li&gt;Cybersecurity trends and current threat situation&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Initial infection&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Types of social engineering&lt;/li&gt;&lt;li&gt;Password-based attacks&lt;/li&gt;&lt;li&gt;Advantages and disadvantages of password policies&lt;/li&gt;&lt;li&gt;Phishing and bypassing MFA / 2FA&lt;/li&gt;&lt;li&gt;M365 attacks&lt;/li&gt;&lt;li&gt;Adversary-in-the-browser attack&lt;/li&gt;&lt;li&gt;Browser-in-the-browser attack&lt;/li&gt;&lt;li&gt;Recognizing and preventing phishing&lt;/li&gt;&lt;li&gt;Email-based attacks&lt;/li&gt;&lt;li&gt;Browser-based attacks&lt;/li&gt;&lt;li&gt;Attacks with peripheral devices&lt;/li&gt;&lt;li&gt;Exploit vs. social engineering&lt;/li&gt;&lt;li&gt;Physical attacks&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Infrastructure security&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction of the attack chain&lt;/li&gt;&lt;li&gt;Enumeration and footprinting&lt;/li&gt;&lt;li&gt;Discovery and port scanning&lt;/li&gt;&lt;li&gt;Off-line cracking&lt;/li&gt;&lt;li&gt;Reverse and bind shells&lt;/li&gt;&lt;li&gt;Evaluation of vulnerabilities&lt;/li&gt;&lt;li&gt;Command injections, webshells and SSRF&lt;/li&gt;&lt;li&gt;Introduction to Metasploit&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Linux Security&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Linux basics&lt;/li&gt;&lt;li&gt;Linux Exploitation&lt;/li&gt;&lt;li&gt;Lateral movement and pivoting&lt;/li&gt;&lt;li&gt;Privilege Escalation&lt;/li&gt;&lt;li&gt;Post-exploitation&lt;/li&gt;&lt;li&gt;Case Studies&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Windows Security&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Windows basics&lt;/li&gt;&lt;li&gt;Windows Credential System&lt;/li&gt;&lt;li&gt;NG Firewall Invasion&lt;/li&gt;&lt;li&gt;Pivoting&lt;/li&gt;&lt;li&gt;Memory Corruptions&lt;/li&gt;&lt;li&gt;Exploit Mitigations&lt;/li&gt;&lt;li&gt;Meterpreter advanced&lt;/li&gt;&lt;li&gt;Keylogging&lt;/li&gt;&lt;li&gt;Client-Side Exploitation&lt;/li&gt;&lt;li&gt;Sysinternals Suite&lt;/li&gt;&lt;li&gt;Library hijacking&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Active Directory Security&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Active Directory basics&lt;/li&gt;&lt;li&gt;Coercion attacks&lt;/li&gt;&lt;li&gt;Passing on the hash (PTH)&lt;/li&gt;&lt;li&gt;Passing on the ticket (PTT)&lt;/li&gt;&lt;li&gt;Golden tickets, silver tickets&lt;/li&gt;&lt;li&gt;Impersonation&lt;/li&gt;&lt;li&gt;Kerberoasting&lt;/li&gt;&lt;li&gt;Over-pass the Hash / Pass the Key&lt;/li&gt;&lt;li&gt;Skeleton key&lt;/li&gt;&lt;li&gt;Machine account quota&lt;/li&gt;&lt;li&gt;AdminSDHolder&lt;/li&gt;&lt;li&gt;Enterprise access model&lt;/li&gt;&lt;li&gt;Privileged Access Workstations&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Evasion&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Native Malware, Powershell Malware, .NET Malware&lt;/li&gt;&lt;li&gt;A/V evasion&lt;/li&gt;&lt;li&gt;Exfiltration and C+C&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Post-exploitation&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Native and meterpreter commands for post-exploitation&lt;/li&gt;&lt;li&gt;Living-off-the-land attacks&lt;/li&gt;&lt;li&gt;Fileless malware&lt;/li&gt;&lt;li&gt;Lateral Movemenent (RDP, WMI, WinRM, DCOM RPC)&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Defense in Depth&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Windows hardening&lt;/li&gt;&lt;li&gt;Active Directory Hardening&lt;/li&gt;&lt;li&gt;The Kill Chain&lt;/li&gt;&lt;li&gt;Network defense&lt;/li&gt;&lt;li&gt;Basics of ISMS&lt;/li&gt;&lt;li&gt;Advanced network defense&lt;/li&gt;&lt;li&gt;Threat modeling and protecting crown jewels&lt;/li&gt;&lt;li&gt;Setting up and operating security operation centers&lt;/li&gt;&lt;li&gt;Incident response policies&lt;/li&gt;&lt;li&gt;Threat intelligence&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Ransomware defense&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Backup strategy&lt;/li&gt;&lt;li&gt;RPO and RTO&lt;/li&gt;&lt;li&gt;Recovery strategy&lt;/li&gt;&lt;li&gt;Ransomware protection&lt;/li&gt;&lt;li&gt;To pay or not to pay?&lt;/li&gt;&lt;li&gt;Decryption considerations&lt;/li&gt;&lt;li&gt;Tools&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Web security&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction to web applications, services and http&lt;/li&gt;&lt;li&gt;OWASP TOP 10&lt;/li&gt;&lt;li&gt;Dealing with browser developer tools&lt;/li&gt;&lt;li&gt;Web vulnerabilities on the server side (SSRF, command injections, deserialization, SQLi, file inclusion)&lt;/li&gt;&lt;li&gt;Browser-supported web vulnerabilities (XSS, XSRF, etc)&lt;/li&gt;&lt;li&gt;Vulnerabilities in web services&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Ask me Anything with trainer&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Open question and answer session&lt;/li&gt;&lt;li&gt;Discussion of current projects&lt;/li&gt;&lt;li&gt;Deepening&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Network security&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction to Wireshark and Scapy&lt;/li&gt;&lt;li&gt;Different types of MiTM attacks&lt;/li&gt;&lt;li&gt;Sniffing and injection&lt;/li&gt;&lt;li&gt;Switching security&lt;/li&gt;&lt;li&gt;Microsegementation&lt;/li&gt;&lt;li&gt;Wifi security main threats&lt;/li&gt;&lt;li&gt;Attacks on TCP/IP stack&lt;/li&gt;&lt;li&gt;TCP, UDP, IPv4/ IPv6 threats&lt;/li&gt;&lt;li&gt;Network access control&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Secure communication&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Encryption basics&lt;/li&gt;&lt;li&gt;Different cryptosuites&lt;/li&gt;&lt;li&gt;Public key infrastructures&lt;/li&gt;&lt;li&gt;Crypto-Hardening&lt;/li&gt;&lt;li&gt;Practical use of cryptography&lt;/li&gt;&lt;li&gt;Introduction to TLS/SSL&lt;/li&gt;&lt;li&gt;TLS/SSL attacks and defense&lt;/li&gt;&lt;li&gt;Hard disk encryption&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Denial of service&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Types of denial of service&lt;/li&gt;&lt;li&gt;Motives of the attackers&lt;/li&gt;&lt;li&gt;Memory corruption DoS&lt;/li&gt;&lt;li&gt;Focus on volume-based DDoS&lt;/li&gt;&lt;li&gt;Defense against denial of service&lt;/li&gt;&lt;li&gt;Incident response for DoS&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;Case studies and exercises&lt;/h4&gt;&lt;h5&gt;Basics&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Setting up a phishing page&lt;/li&gt;&lt;li&gt;DNS reconnaissance&lt;/li&gt;&lt;li&gt;Port scanning&lt;/li&gt;&lt;li&gt;Exchange-Exploitation&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Linux&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Exploitation of a Linux server&lt;/li&gt;&lt;li&gt;Post-exploitation of the Linux server&lt;/li&gt;&lt;li&gt;Linux lateral movement&lt;/li&gt;&lt;li&gt;Heartbleed&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Windows&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Pivot to Windows&lt;/li&gt;&lt;li&gt;Lateral movement in Active Directory - Coercion attack&lt;/li&gt;&lt;li&gt;Kerberoasting&lt;/li&gt;&lt;li&gt;Post-Exploitation&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Web&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Web bruteforcing&lt;/li&gt;&lt;li&gt;XSS vulnerability&lt;/li&gt;&lt;li&gt;SQL Injection&lt;/li&gt;&lt;li&gt;Exploitation Wordpress RCE&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Networking&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Scapy basics&lt;/li&gt;&lt;li&gt;Analysis of MiTM attacks&lt;/li&gt;&lt;li&gt;Wireshark basics&lt;/li&gt;&lt;li&gt;VoIP interception of WebRTC traffic&lt;/li&gt;&lt;li&gt;TLS stripping with HSTS bypass&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Demos&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Attack on Keepass&lt;/li&gt;&lt;li&gt;Windows DLL hijacking&lt;/li&gt;&lt;li&gt;Examples from Virustotal and Any.run&lt;/li&gt;&lt;li&gt;Backdoor with MSFvenom&lt;/li&gt;&lt;li&gt;Targeted breaking of an A/V signature&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>The aim of the course is to impart technical and organizational knowledge in the field of IT security so that participants can make sensible decisions in their daily work to improve IT security efficiently and sustainably. Numerous practical exercises will enable you to recognize and ward off attacks or to close or reduce existing security gaps.</objective_plain><essentials_plain>- Experience with the operation and administration of IT systems
- Basic IT security knowledge</essentials_plain><audience_plain>This beginner's course is aimed at IT security officers, IT administrators (client, server, network), programmers, IT engineers and Security Operation Center (SOC) operators as well as anyone who wants to view security risks from the perspective of the attacker and thus develop solution scenarios.</audience_plain><contents_plain>- Basics of cyber security
- Current trends
- Initial infection
- Infrastructure security
- Linux attacks
- Windows attacks
- Post-exploitation
- Active Directory
- Post Exploitation
- Defense in Depth
- Ransomware
- Ask me Anything
- Web Security
- Denial of Service
- Network Security</contents_plain><outline_plain>Cybersecurity basics


- What is hacking?
- What is IT security?
- Attackers, motivation and tactics
- General definitions and metrics
- Attack techniques and tactics according to Mitre Att&amp;ck
Current trends


- Current metrics
- Proven attack techniques
- Cybersecurity trends and current threat situation
Initial infection


- Types of social engineering
- Password-based attacks
- Advantages and disadvantages of password policies
- Phishing and bypassing MFA / 2FA
- M365 attacks
- Adversary-in-the-browser attack
- Browser-in-the-browser attack
- Recognizing and preventing phishing
- Email-based attacks
- Browser-based attacks
- Attacks with peripheral devices
- Exploit vs. social engineering
- Physical attacks
Infrastructure security


- Introduction of the attack chain
- Enumeration and footprinting
- Discovery and port scanning
- Off-line cracking
- Reverse and bind shells
- Evaluation of vulnerabilities
- Command injections, webshells and SSRF
- Introduction to Metasploit
Linux Security


- Linux basics
- Linux Exploitation
- Lateral movement and pivoting
- Privilege Escalation
- Post-exploitation
- Case Studies
Windows Security


- Windows basics
- Windows Credential System
- NG Firewall Invasion
- Pivoting
- Memory Corruptions
- Exploit Mitigations
- Meterpreter advanced
- Keylogging
- Client-Side Exploitation
- Sysinternals Suite
- Library hijacking
Active Directory Security


- Active Directory basics
- Coercion attacks
- Passing on the hash (PTH)
- Passing on the ticket (PTT)
- Golden tickets, silver tickets
- Impersonation
- Kerberoasting
- Over-pass the Hash / Pass the Key
- Skeleton key
- Machine account quota
- AdminSDHolder
- Enterprise access model
- Privileged Access Workstations
Evasion


- Native Malware, Powershell Malware, .NET Malware
- A/V evasion
- Exfiltration and C+C
Post-exploitation


- Native and meterpreter commands for post-exploitation
- Living-off-the-land attacks
- Fileless malware
- Lateral Movemenent (RDP, WMI, WinRM, DCOM RPC)
Defense in Depth


- Windows hardening
- Active Directory Hardening
- The Kill Chain
- Network defense
- Basics of ISMS
- Advanced network defense
- Threat modeling and protecting crown jewels
- Setting up and operating security operation centers
- Incident response policies
- Threat intelligence
Ransomware defense


- Backup strategy
- RPO and RTO
- Recovery strategy
- Ransomware protection
- To pay or not to pay?
- Decryption considerations
- Tools
Web security


- Introduction to web applications, services and http
- OWASP TOP 10
- Dealing with browser developer tools
- Web vulnerabilities on the server side (SSRF, command injections, deserialization, SQLi, file inclusion)
- Browser-supported web vulnerabilities (XSS, XSRF, etc)
- Vulnerabilities in web services
Ask me Anything with trainer


- Open question and answer session
- Discussion of current projects
- Deepening
Network security


- Introduction to Wireshark and Scapy
- Different types of MiTM attacks
- Sniffing and injection
- Switching security
- Microsegementation
- Wifi security main threats
- Attacks on TCP/IP stack
- TCP, UDP, IPv4/ IPv6 threats
- Network access control
Secure communication


- Encryption basics
- Different cryptosuites
- Public key infrastructures
- Crypto-Hardening
- Practical use of cryptography
- Introduction to TLS/SSL
- TLS/SSL attacks and defense
- Hard disk encryption
Denial of service


- Types of denial of service
- Motives of the attackers
- Memory corruption DoS
- Focus on volume-based DDoS
- Defense against denial of service
- Incident response for DoS
Case studies and exercises

Basics


- Setting up a phishing page
- DNS reconnaissance
- Port scanning
- Exchange-Exploitation
Linux


- Exploitation of a Linux server
- Post-exploitation of the Linux server
- Linux lateral movement
- Heartbleed
Windows


- Pivot to Windows
- Lateral movement in Active Directory - Coercion attack
- Kerberoasting
- Post-Exploitation
Web


- Web bruteforcing
- XSS vulnerability
- SQL Injection
- Exploitation Wordpress RCE
Networking


- Scapy basics
- Analysis of MiTM attacks
- Wireshark basics
- VoIP interception of WebRTC traffic
- TLS stripping with HSTS bypass
Demos


- Attack on Keepass
- Windows DLL hijacking
- Examples from Virustotal and Any.run
- Backdoor with MSFvenom
- Targeted breaking of an A/V signature</outline_plain><duration unit="d" days="4">4 days</duration><pricelist><price country="DE" currency="EUR">3490.00</price><price country="AT" currency="EUR">3490.00</price><price country="SE" currency="EUR">3490.00</price><price country="IL" currency="ILS">8990.00</price><price country="AE" currency="USD">2990.00</price><price country="SI" currency="EUR">3490.00</price><price country="CH" currency="CHF">3490.00</price></pricelist><miles/></course>