During this comprehensive course, tools and methodologies that are used during penetration tests in enterprise network/application environments will be detailed. The course will utilize a lab environment for a hands-on instruction of manual penetration testing methods, in addition to training for use of exploitation frameworks, such as Metasploit.
Focus will be geared towards methodology, processes, vectors, tools, and techniques used for exploitation. By the end of the course, the student will have an in-depth understanding of the underlying principals of network/application exploitation and will have gained experience in the successful execution of attacks.
Minimum Course Requirements:
Bring a Laptop with: 8GB of RAM at Minimum and Quad-Core Processor at minimum with the ability to Run Virtual Machines Understanding of Basic Networking Concepts Basic Linux Comprehension
Target Audience: This seminar is geared towards those seeking to enter the information security industry while also enriching those who seek to develop the skills and experience necessary to succeed as a penetration tester(for fun and for profit).
Rod Soto has over 15 years of experience in information technology and security. He has spoken at ISSA, ISC2, OWASP, RSA, DerbyCon,BlackHat, DEFCON, Hackmiami, Bsides and also been featured in Rolling Stone Magazine, Pentest Magazine, Univision, VICE and CNN. Rod Soto was the winner of the 2012 BlackHat Las vegas CTF competition and is the founder and lead developer of the Kommand && KonTroll/ NOQRTRCTF competitive hacking Tournament series. He has also architected and co-develop military cyber ranges.