This workshop is intended to provide a practical approach to exchange best practices in the implementation of Ethical Hacking. It will provide an enriching experience for all the attendees who takes part in this session. We believe that there is a hacker in everyone and we will help you to find the one inside you.
This bootcamp is aimed at anyone who wants to be an ethical hacker on their own and possibly work as a freelancer or employee in the field of Cybersecurity and ethical hacking. We cover everything, so even if you’ve never seen HTML code in your life, you’ll be able to quickly jump in.
WE Make Hackers
Our rigorous and unique training methodology makes us a class apart. Hackers should have a tough mental attitude, so our tailored modules will take you through the toughest lanes of thoughts . We create that attitude in each of our students.
Hands-on Linux/Unix Basics (which is required to cover this workshop) : In this section, you will be introduced to basic coaching on UNIX, LINUX and KALI LINUX. By the end of this session, you will get familiar with the concepts of UNIX and LINUX, different distributions of LINUX as well as KALI LINUX, installation of KALI LINUX and its environment.
Ethical Hacking Methodology : In this session you will hear ethical hacking / pentest methodologies. We would cover different penetration testing tools and techniques that a pentester would require during different phases of testing.
Setting up a Penetration testing Lab environment : In this session you will learn to setup your own hacking lab environment.
Hands-on Exercises on
Intelligence Gathering : In this session, we will learn about different tools and Techniques for gathering information from various targeted systems.
Enumeration and Scanning : This session would take you through different tools and techniques which are used in finding out Open Ports and enumerate services running in those ports. Also, you will get to learn how to find out the vulnerabilities on the target.
Exploitation : While coming to this session we would teach you how to exploit the target system based on the information and the vulnerabilities collected in the last 2 phases.
Post Exploitation : Here we will be learning about the Privilege Escalation, in order to gain more privilege in the exploited systems.
Capture the Flag Challenge at the end of the session.
Digital Participation Certificate
E-Book ~ The Bad Boys Art Book – by Wattlecorp