Find out about the Pentester as a job role and the methodology they use in our extended intro. This is followed by an exciting live demo on a Hera Lab scenario, which will cover several steps of the Pentester from information gathering to post exploitation.
We will engage attendees into the world of cyber security with real life examples and a hands-on approach.
Location to be disclosed.
Find out about the Pentester as a job role and the methodology they use in our extended intro. This is followed by an exciting live demo on a Hera Lab scenario, which will cover several steps of the Pentester from information gathering to post exploitation. We’re going to get technical and bring all of you behind the scenes of a real-world penetration test.
We will engage attendees into the world of cyber security with real life examples and a hands-on approach, this lab will prepare you for critical scenarios and how to respond to them whilst tutored by some of the most renowned security experts.
Location to be disclosed.
Lab ID | Description | Category |
---|---|---|
Lab 1 | HTTP(S) Traffic Sniffing | Preliminary Skills |
Lab 2 | Find the secret server | Preliminary Skills |
Lab 3 | Burp Suite | Preliminary Skills |
Lab 4 | Scanning and OS fingerprinting | Penetration Testing |
Lab 5 | Nessus | Penetration Testing |
Lab 6 | Dirbuster | Penetration Testing |
Lab 7 | Cross site scripting | Penetration Testing |
Lab 8 | SQL Injection | Penetration Testing |
Lab 9 | Bruteforce and Password Cracking | Penetration Testing |
Lab 10 | Null Sessions | Penetration Testing |
Lab 11 | ARP Poisoning | Penetration Testing |
Lab 12 | Metasploit | Penetration Testing |
Need more informations? Send us a message