Pentest. The practice of penetration testing or "ethical hacking". New course from OTUS

Attention! This article is not an engineering article and is intended for readers who are interested in ethical hacking and education in this direction. Most likely, if you are not interested in learning, this material will not be of interest to you.

Pentest. The practice of penetration testing or "ethical hacking". New course from OTUS

Penetration testing is the process of legally hacking information systems in order to identify vulnerabilities in the information system. Pentest (that is, penetration testing) takes place at the request of the customer, and upon completion, the contractor gives him recommendations on how to eliminate vulnerabilities.

If you want to be able to recognize various types of vulnerabilities and protect network and web resources from malicious attacks, then Otus will teach you this. Launched enrollment for the course "Pentest. Penetration Testing Practice"

Who is this course for?

Programmers, network administrators, information security specialists, as well as final-year students in the areas of "information security" and "security of automated systems".

You can get through entrance testingto see if you can take this course. Your knowledge is definitely enough if you:

  • Know the basics of TCP/IP
  • Know the basics of using the command line of Windows and Linux operating systems
  • Understand how client-server applications work
  • You are the owner of the following hardware: 8 GB RAM, high-speed Internet connection, 150 GB of free hard disk space

December 19 20: 00 will Open Day, where the teacher of the course “Pentest. Penetration practice” — Alexander Kolesnikov (virus analyst in an international company) answer all questions about the course, tell in more detail about the program, online format and learning outcomes.

At the end of the course, you will learn:

  • The main stages of penetration testing
  • The use of modern tools for analyzing the security of an information system or application
  • Classification of vulnerabilities and methods of their correction
  • Programming skills to automate routine tasks

Pentest. The practice of penetration testing or "ethical hacking". New course from OTUS

The purpose of the course is to show in practice how a detailed analysis of network resources, software, web resources for vulnerabilities, their exploitation and further elimination is carried out.

To have an even clearer understanding of this course, you can check out past webinars:

"How to start dealing with bugs on the Web"

"All About the Course" (previous run)

Also visit open lesson “AD: basic concepts. How does BloodHoundAD work? That will take place December 17 20: 00. This webinar will cover the basic concepts: What is AD, basic services, access control, as well as the mechanisms that are used by the BloodHoundAD utility.

See you on the course!

Source: habr.com

Add a comment