" />

Advanced Pentesting

Advanced Pentesting

16 January 2016 — 31 January 2016

Special Focus

The Internet is a pervasive force which is working its way into all aspects of our civilization – of this fact there is no doubt. One could spend countless hours, days, and months debating and studying the implications and connotations of this fact and its influence on education, business, etc. However, in studying this medium, it is important to remain cautious and realize the security issues surrounding the Internet. Being overly cautious and conservative in this exploration is detrimental and foolish – others, leaving the paranoid in the dust, will expand the resources left undiscovered by frightened people. It is ultimately more careless to assume that all is legitimate and nothing will harm you. It’s that old principle of “that’ll never happen to me” that can make one vulnerable. Educated medium should be achieved between these extremes.

This training course is part of six-month program:



Price 150.00 Eur
Application deadline 15 January 2016
(This course has ended)

Course Details


☆  Module 1

Penetration Testing with Python
Forensic Investigations
Network Traffic Analysis
Wireless Mayhem
Web Recon
Antivirus Evasion

☆  Module 2

Chapter 1: Planning and Scoping for a Successful Penetration Test
Chapter 2: Introduction to reconnaissance
Chapter 3: Enumeration:
Chapter 4: Remote Exploitation
Chapter 5: Web Application Exploitation
Chapter 6: Exploits and Client-Side Attacks
Chapter 7: Bypassing Firewalls and Avoiding Detection

☆  Week 1

Chapter 1: Planning and Scoping for a Successful Penetration Test
Chapter 2: Introduction to reconnaissance
Chapter 3: Enumeration:
Chapter 4: Remote Exploitation
Chapter 5: Web Application Exploitation
Chapter 6: Exploits and Client-Side Attacks
Chapter 7: Bypassing Firewalls and Avoiding Detection

☆  Week 2

Wireless Mayhem
Web Recon
Antivirus Evasion

☆  Week 3

Planning and Scoping for a Successful Penetration Test
Introduction to reconnaissance
Enumeration
Remote Exploitation

☆  Week 4

Web Application Exploitation
Exploits and Client-Side Attacks
Bypassing Firewalls and Avoiding Detection

☆  Prerequisites

Knowledge in Linux Systems (LINUX 101), Network Architecture , Programming (PYTHON) . Metasploit, and daily compiuter skills.

☆  Duration

24 hours
Saturday & Sunday, starting 17:00 – 20:00
16 January 2016 – 31 January 2016




Advanced Pentesting

Drinor Selmanaj

Instructor

Drinor Selmanaj is a lecturer, entrepreneur and information security specialist from Kosovo.
He has spent his years consulting, auditing, and hardening IT-infrastructures in companies and organizations across the region.
As a lecturer, he has established a Penetration Testing programme at ICK which seeks to hone the skills of young technology enthusiasts looking into entering the field of cybersecurity.
His entrepreneurial spirit led him to found a software development company called “Hello World!” centered around creating secure and highly functional digital products for local companies and businesses.
He is the CTO and co-founder of “Sentry L.L.C” - one of the first companies in Kosovo to regionally offer products and an extensive list of services in information security.
As a citizen of Kosovo and a member of various hacker communities, Drinor is able to see both the needs of legitimate businesses as well as the needs of a darker digital underground.






BOLD

© ICK — Innovation Centre Kosovo