Security Training ▸ Penetration Test

Penetration Test Training

Advanced Hacking Methodology from Offensive POV

#PENTEST

#Penetration Test

What is Penetration Test Training?

As people started working digital, it became feasible for the hackers to attack the IT system using its vulnerabilities. Moreover, hackers expanded their scope of activity from web API and network protocols to IT systems such as server and clients. Also, automated tools used in attacking IT systems are becoming advanced that the world needs a solid defense system. In this course, you will be able to learn the methodology of advanced penetration testing that is not only a simple vulnerability test but also ‘ethical hacking’. Also, you will learn how to use tools that are used to attack through vulnerabilities. Become an ethical hacker and be a professional at penetration test!

Who should take this course?

Security researchers

Security researchers

IT teams

IT teams

Security consultants

Security consultants

System/Network<br>managers

System/Network
managers

Other related professionals

Other related professionals

Why Penetration Test Training?

Cyber Defense Systems
 

Techniques that are used
in real-world cases

Attacking Tools that
threaten IT assets

The newest hacking trends on web and network

Protecting server and client
 

Standards and frameworks for penetration test

Curriculum

Day 1

[Active and Passive Data Collecting]

– Collecting Data before Penetration Test
– Different kinds of penetration and deciding target

01

[OWASP]

– OWASP Standards for researching data exposure, malicious files, scripts, and vulnerabilities
– Recent OWASP TOP 10 Vulnerabilities

02
Day 2

[Automatic Testing tools]

– Open-Source tools

01

[Vulnerabilities of Client]

-Attacking vulnerabilities of script that includes Developer tools (i.e. HTML), and Proxy tools

02

[Vulnerabilities of Server]

– Attacking SQL Injection, Command injection
– Attacking methods that use Database

03
Day 3

[Web Shell]

– Web Shell for Web App Exploitation

01

[Web Exploit Tool Kit]

– Web Exploit Tool Kit that includes obfuscated Java Script and its vulnerabilities

02

Prerequisites

Basic Knowledge on Cyber Security

Basic Knowledge on Linux OS

C, Python Programming

Notice

NSHC provides following items for your convenience.

1) Laptop
We provide laptop with software that you will need for hands-on training.

2) Textbook
All the learning materials will be provided in form of a textbook.

3) Training fee
Lunches and snacks are included in your training fee.
Transportation, accommodation, and dinner are excluded.

4) Certificate of Completion
We give the certificate of completion to those who finish the training.

Location

TBA, Seoul

Registration and Payment

There are two ways to pay the training fee: PayPal or bank transfer

You may select preferred payment method when submitting the registration form.
We will assist you after your registration form is received.

If you have any question regarding the payment, please contact us at training@nshc.net.

Refund Policy

You may receive a full refund without a penalty if you make cancellation a week prior to the training. Or, you will be charged for 10% cancellation fee.

  • Cancellation made until [8 days] before the training : fully refundable

  • Cancellation made within [7 days ~ the day of training]: 10% cancellation fee is charged.

  • Refund policy may be changed without a notice.

Security Training ▸ Penetration Test

Penetration Test

#PENTEST

#Penetration Test

$3,300(USD)

VAT incl.
  • Date
    TBA
  • Time
    09:30 ~ 18:00
  • Location
    TBA, Seoul
  • Deadline
    -
  • Capacity
    15