Ethical Hacking and Penetration Testing

The Ethical Hacking and Penetration Testing course is composed of three domains of cybersecurity:

  • Introduction to Ethical Hacking and Penetration Testing
  • Vulnerability Assessment/Scanning Process
  • Using the Kali Linux Operating System

Lessons duration

3 days

Lessons difficulty

Beginner

Introduction to Ethical Hacking and Penetration Testing

Offers a unique perspective on how ethical hackers think and act to identify vulnerabilities and ensure the proper protection of sensitive data and information.

Vulnerability Assessment/Scanning Process

Refers to the process of identifying the vulnerabilities of a system or infrastructure, using automated tools and specific methods to identify the system’s weak points.

Using the Kali Linux Operating System

Kali Linux is a Linux-based operating system distribution derived from Debian, primarily used for security testing and cyber investigations. It offers a wide collection of tools for vulnerability scanning, malware investigation, cryptography testing, and more.

Participation Requirements

This is a beginner-level course, so only basic computer and Internet skills are required to participate.

Additionally, the tools and software used during the course sessions are open-source or free, available without a license for anyone.

Skills Acquired Upon Course Completion

  • Skills in operating the Kali Linux distribution
  • Skills in installing and configuring the Kali Linux operating system
  • Knowledge of the differences between Vulnerability Assessment and Penetration Testing
  • Skills in identifying vulnerabilities in web applications, cyber networks, mobile applications, and source code
  • Skills in exploiting vulnerabilities
  • Skills in writing a Vulnerability Assessment report

Trainer:

Andrei Ștefănescu

Andrei has over 20 years of experience in IT. He started his career as a system administrator in a television station. The varied requirements allowed him to interact with the IT field in every relevant branch.

 

His experience grew in areas such as hardware, networking, software development, databases, computer administration with Windows (Server and Workstation), Linux, and OSX operating systems.

 

Over time, Andrei has held various key positions (Team Leader, IT Manager), having the opportunity to train and coordinate dozens of young people eager to evolve in the IT field. When cybersecurity became an independent, industry-recognized branch, Andrei focused his energy in that direction, becoming a cybersecurity consultant for various public and private entities.

 

As a consultant, Andrei has had the opportunity to conduct over 200 penetration tests (both at the application and infrastructure levels). He has also been called upon several times to help stop/analyze a cyber attack. In addition to his Red/Blue team activities, Andrei has been a speaker/coordinator at workshops (some with over 100 participants) aimed at development teams, helping them improve their workflow.

Details

Participation Fee: £1,450

During the course, each participant will have access to a computer, virtual lab, notebooks, and writing tools.

Food, water, juices, coffee, and snacks will be provided by the organizers.

AVAILABLE COURSE DATES

Not available

Course schedule & chapters

  1. THEORETICAL MODULE: Introduction to Ethical Hacking and Penetration Testing
  2. THEORETICAL MODULE: Introduction to the Kali Linux Operating System
  3. THEORETICAL MODULE: Differences between Major Linux Distributions (Debian, Ubuntu, Fedora, CentOS, etc.)
  4. PRACTICAL MODULE: Installing and Configuring Kali Linux in VirtualBox as a Virtual Machine
  5. THEORETICAL & PRACTICAL MODULE: Familiarization with the Terminal and Command Line
  6. THEORETICAL & PRACTICAL MODULE: Directories, Files, and Permissions in Kali Linux
  7. THEORETICAL & PRACTICAL MODULE: Software Package Management
  8. PRACTICAL MODULE: Introduction to Kali Linux Tools
  9. PRACTICAL MODULE: Introduction to the Metasploit Exploitation Framework
  10. THEORETICAL MODULE: Introduction to Vulnerability Scanning
  11. THEORETICAL MODULE: Vulnerability Assessment versus Penetration Testing
  12. PRACTICAL MODULE: Vulnerability Scanning for Web Applications
  13. PRACTICAL MODULE: Vulnerability Scanning for Networks and Infrastructures
  14. PRACTICAL MODULE: Vulnerability Scanning for Mobile Applications
  15. PRACTICAL MODULE: Vulnerability Scanning for Source Code (Static Analysis Security Testing – SAST)
  16. PRACTICAL MODULE: Triaging Results and Reporting Vulnerabilities