Attention! This article is not an engineering article and is intended for readers who are interested in ethical hacking and education in this direction. Most likely, if you are not interested in learning, this material will not be of interest to you.
Penetration testing is the process of legally hacking information systems in order to identify vulnerabilities in the information system. Pentest (that is, penetration testing) takes place at the request of the customer, and upon completion, the contractor gives him recommendations on how to eliminate vulnerabilities.
If you want to be able to recognize various types of vulnerabilities and protect network and web resources from malicious attacks, then Otus will teach you this. Launched enrollment for the course
Who is this course for?
Programmers, network administrators, information security specialists, as well as final-year students in the areas of "information security" and "security of automated systems".
You can get through
- Know the basics of TCP/IP
- Know the basics of using the command line of Windows and Linux operating systems
- Understand how client-server applications work
- You are the owner of the following hardware: 8 GB RAM, high-speed Internet connection, 150 GB of free hard disk space
December 19 20: 00 will
At the end of the course, you will learn:
- The main stages of penetration testing
- The use of modern tools for analyzing the security of an information system or application
- Classification of vulnerabilities and methods of their correction
- Programming skills to automate routine tasks
The purpose of the course is to show in practice how a detailed analysis of network resources, software, web resources for vulnerabilities, their exploitation and further elimination is carried out.
To have an even clearer understanding of this course, you can check out past webinars:
"How to start dealing with bugs on the Web"
"All About the Course" (previous run)
Also visit
See you on the course!
Source: habr.com