Becoming a Hacker: An Introduction to Ethical Hacking, Penetration Testing, and Bug Hunting
Published by Pearson
July 12 & 13, 2021
4 - 8 p.m. Coordinated Universal Time
This event has ended.
Becoming a Hacker is your first step to starting your ethical hacking and penetration testing career. This intensive two-day training session is taught by Omar Santos, best-selling security author and speaker. This training includes focused live discussions, real-world demos, and insights into hacking from someone who’s been on the front lines. You will benefit from expert insights of the methodologies used to assess and compromise a network. You will also learn about the legal aspects of ethical hacking and the associated risks. This course additionally reviews many different tools that can be used to penetrate a wired and wireless network and the systems within that network.
No prior penetration testing or ethical hacking experience is needed. You will be introduced to offensive cybersecurity concepts and then walk through a complete penetration test, from beginning to end. You will explore passive and active reconnaissance, fuzzing, enumeration, vulnerability assessment, exploitation, and post-exploitation techniques. This course is also helpful for those seeking certifications such as the Offensive Security Certified Professional (OSCP) Certification, CEH Practical, PenTest+, or the GIAC Penetration Tester (GPEN), this two-day training session is a great place to start. This live training can also help you if you want to start exploring the world of bug hunting and bug bounties.
This course is also helpful for those seeking certifications such as the Offensive Security Certified Professional (OSCP) Certification, CEH Practical, PenTest+, or the GIAC Penetration Tester (GPEN), this two-day training session is a great place to start.
What you’ll learn and how you can apply it
- Learn fundamentals of ethical hacking or security penetration testing
- Learn how to build your lab with WebSploit, Kali Linux, and Parrot Security to perform different penetration testing and bug hunting scenarios
- Passive and Active Reconnaissance
- Open Source Intelligence (OSINT)
- Vulnerability Scanning
- Web Application Reconnaissance
- Introduction to Hacking Web Applications
- Introduction to Hacking User Credentials
- Web Application Injection Attacks and Hacking Databases
- Introduction to Hacking Networking Devices
- Fundamentals of Wireless Hacking
- Introduction to Buffer Overflows
- Introduction to Evasion and Post Exploitation Techniques
- Introduction to Social Engineering
- How to Maintain Persistence, Pivoting, and Data Exfiltration
- Writing Penetration Testing Reports
This live event is for you because…
- You have an understanding of cybersecurity fundamentals.
- You would like to learn the fundamentals of ethical hacking and penetration testing.
- You would like to learn about the tools necessary to perform penetration testing as well as also real-life methodologies.
- You are studying for the Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), PenTest+, or GPEN Certifications.
- Anyone interested in cybersecurity and penetration testing (ethical hacking) will benefit from this training.
- You want to learn different methodologies and best practices to perform security penetration testing assessments.
- Course participants should have a basic understanding of cybersecurity and networking concepts.
- The following video course provides a good overview of cybersecurity fundamentals that are prerequisites for this course: The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
- Setup WebSploit as documented at: https://websploit.org
- The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
- Certified Ethical Hacker Complete Video Course
The timeframes are only estimates and may vary according to how the class is progressing.
An Overview of Ethical Hacking and Penetration Testing Methodologies (20 minutes)
Building your own pen testing lab with WebSploit (30 minutes)
Passive Reconnaissance and Open Source Intelligence (OSINT) (30 minutes)
Break (10 minutes)
Active Reconnaissance, Scanning, and Fuzzing (30 minutes)
Introduction to Hacking Web Applications (50 minutes)
Break (10 minutes)
Introduction to Hacking User Credentials and Cracking Passwords (30 minutes)
Introduction to Hacking Databases (30 minutes)
Introduction to Hacking Networking Devices (30 minutes)
Fundamentals of Wireless Hacking (30 minutes)
Introduction to Buffer Overflows (40 minutes)
Break (10 minutes)
Introduction to Social Engineering (20 minutes)
Fundamentals of Evasion and Post Exploitation Techniques (30 minutes)
Break (10 minutes)
Command and Control, Exfiltration, and Privilege Escalation (30 minutes)
Best Practices on How to Write Penetration Testing Reports (20 minutes)
Q&A (20 minutes)
Omar Santos is an active member of the cybersecurity community, where he leads several industry-wide initiatives. He is the lead of the DEF CON Red Team Village; the chair of the Common Security Advisory Framework (CSAF) technical committee; the co-chair of the Forum of Incident Response and Security Teams (FIRST) Open Source Security working group; and has been the chair of several initiatives in the Industry Consortium for Advancement of Security on the Internet (ICASI). His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to increasing the security of their critical infrastructures.
Omar is the author of over twenty books and video courses, as well as numerous white papers, articles, and security configuration guidelines and best practices. Omar is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities. Additional information about Omar’s current projects can be found at omarsantos.io and you can follow Omar on Twitter @santosomar.