
Pentestit corporate laboratories are unique in their format and content, practical information security training courses, developed on the basis of the best penetration testing practices and security analysis, comparable in content to hacker conferences.
Specialists trained in Corporate Laboratories gain invaluable practical experience in working with modern methods and tools to penetrate the system, study the psychology of intruders, investigate cybercrime, and, based on this, learn to develop the most effective defense mechanisms. In the article we will tell you what the uniqueness of our training program is and what specialists who graduated from the course “Corporate Laboratories” receive.
The program "Corporate Laboratories" is developed taking into account the materials and practices used by both hackers and employees of the information security departments of various companies. Listening to the wishes of specialists attending our training, we regularly update the course content so as to ensure comfortable and high-quality training. For these purposes, we have developed our own platforms: a convenient personal account, a functional service for viewing webinars, unique pentest laboratories built on the basis of corporate networks of real companies.
')
Update material
With each set, our specialists update the training material on the basis of trends in the development of modern threats and means of countering intruders. On average, each new training set is updated 10-15% of the material.
When updating the material, we consider the following factors:
- the relevance of the material;
- updating or processing technical equipment;
- the emergence of new vulnerabilities, and as a result, new attack vectors;
- loud cyber security event;
- wishes of students.
New program
Given the development of modern vectors and attack scenarios on corporate networks, we expanded our training program and added new webinars and practical tasks on the following topics:
Network Security in the IPv6 Age:- Introduction to IPv6 theory
- scan and search for live IPv6 hosts;
- man-in-the-middle in an IPv6 environment;
- IPv6 security methods.
Android Security:- Android security architecture and model;
- application security (security sdk, permissions, ipc);
- reverse engineering applications;
- patching applications (application modification and reverse assembly).
Using Python in penetration testing:- a brief introduction to Python;
- work with network services;
- work with web applications.
Wireless Security:- classic attacks on wireless networks;
- fake access points (Rogue AP, Evil Twin, Karma);
- detection of anomalies of the ether and the detection of attacks;
- wireless security methods.
Training
The course is completely remote. For maximum comfort of students, we have developed a specialized webinar platform, a convenient personal account and a virtual lab environment, which is connected via a VPN connection.
The consolidation of knowledge gained through the unique courses of ethical hacking and penetration testing from Pentestit is performed by completing tasks for hacking and protecting systems of varying complexity in conditions close to real ones. In the process of training, employees study the nature of vulnerabilities, exploitation tools, become familiar with the psychology and tools of the attacker and with the methods of protection.
Most of the specialists who have already been trained in Pentestit Corporate Laboratories are active employees of large organizations (banks, state institutions, the largest Internet projects) and regularly raising their professional level in the field of practical information security.
Learn more and sign up for the next courses can be on the
link .