Date | Day | Time | Duration |
9 May | Monday | 09:00 to 17:00 CEST/GMT+2 | 8 Hours |
10 May | Tuesday | 09:00 to 17:00 CEST/GMT+2 | 8 Hours |
11 May | Wednesday | 09:00 to 17:00 CEST/GMT+2 | 8 Hours |
12 May | Thursday | 09:00 to 17:00 CEST/GMT+2 | 8 Hours |
The course starts off with fundamental security knowledge to provide you with a solid technical base to build upon. The attack model starts from an external perspective with the main objective of taking over an organization.
You’ll be exposed to open-source intelligence gathering techniques, external and web application hacking skills and working your way into an organization, ending with advanced internal network compromises and objective completion. Throughout the course you will gain actual attacker skills and knowledge to apply in real-world scenarios.
Join us and hack hard!
• History and fundamentals of hacking • Methodologies used by active penetration testers • Open-source intelligence gathering • External infrastructure hacking techniques • Web application hacking techniques • Enterprise infrastructure hacking techniques • Active Directory based attacks • Business critical system compromises and actions on objectives • Further learning and skills advancement for a career in hacking
Jason is a security analyst at SensePost. He found his passion in information security during his honours year at Rhodes University where he studied Computer Science and Information systems. When he is not busy hacking into the night he often breaks company signs.