Masterclass: 360° Penetration Testing Course

Standard Price: 3500 PLN net | 900 EUR net
2 days, Advanced level
ISSA Poland members -10%
October 2015, Warsaw, Poland


Training Schedule

Dateprice(PLN/person)
22-10-2015 to 23-10-2015Warsaw - 3500 PLN net | 900 EUR net

WARSAW - Training Agenda (EN)

WARSAW - Training Agenda (PL)

 

Are you in need for dedicated IT security training? Invite us over! We deliver worldwide!

 

Paula Januszkiewicz Hexcode 2014

About the Trainer

Paula Januszkiewicz

Paula is an IT Security Auditor and Penetration Tester, Enterprise Security MVP and trainer (MCT) and Microsoft Security Trusted Advisor. She also is a top-speaker on many well-known conferences (for example: TechEd North America, TechEd Europe, TechEd Middle East, TechDays worldwide RSA worldwide, CyberCrime etc.) and a publihed author of articles on Windows Security. She conducted hundreds of IT security audits and penetration tests, including those for military customers. Her distinct specialization is definitely in Microsoft security solutions, the field she holds multiple Microsoft certifications in (MCITP, MCTS, MCSE, MCDBA etc.).  A number of certifications in other related technologies add up to a successful expert portfolio.  Paula is passionate about sharing her knowledge with others. In her private time, she enjoys researching new technologies, which she converts into authored trainings. She authored a book on Threat Management Gateway 2010. She has been doing penetration tests for 10 years now! She has got official access to a source code for Windows!

 

Paula says: We go far beyond simply presenting how to 'break into operating systems'! We are proud to say that this course is equally important for those who need to test, defend or perform a risk assessment of their infrastructure. Let us infect you with technology PASSION!

 

Overview

Our course has been developed around professional penetration testing and security awareness in the business and IT fields. To make sure that all participants will gain the necessary infrastructure security knowledge our classes have the intensive hands-‐on format. All labs are constantly updated and have 3 levels of difficulty and can be easily adjustable to the overall level of the group. Every exercise is supported with the lab instructions and multiple tools, traditional and specialized.

We recommend students have some knowledge of security concepts, such as operating system services and architecture. However, all required concepts will be covered throughout the course.

 

Training objectives

  • Identify security profile of the target
  • Perform the testing activities
  • Figure out protection opportunities
  • Optimize security controls to reduce risks

 

Materials

  • Student Workbook
  • Student Manual
  • Tools - 1 DVD

 

Outline

Modul 1. Evolution of Hacking

Module 2. Operating System Services Security Overview

Module 3. Operating System Internal Security

Module 4. Databases Security

Module 5. Google Hacking

Module 6. HTTP Request Building

Module 7. Reconnaissance and Target Profiling

Module 8. Information Leakage and Error Handling       

Module 9. Session Manipulation

Module 10. Tampering with Communication (Wired and Wireless)

Module 11. Exploiting a Lack of Access Controls

Module 12. Malicious Files Execution

Module 13. Legal Issues

© 2012 HEXCODE All Rights Reserved