Too often, beginner courses assume an already high level of skill and understanding of the subject matter being taught. Our beginner's course is different in that we start at the beginning, and assume you are here to learn how attackers compromise targets, as well as ensuring you get to do the same thing. As the title suggests, it provides an ideal training ground for our other SensePost Training courses, further self-study, or other hacking courses.
We start off explaining why vulnerabilities exist, how one would discover them and also what the next step is. This gets you into the mindset of a hacker and by exploiting real-world vulnerabilities yourselves, you start to see how attackers operate. It is very much hands on, you target and exploit systems found in modern networks and corporations today.
COURSE TOPICS
- Information security fundamentals
- Working with a command-line interface (Linux and Windows)
- An introduction to an offensive Linux Operating System
- Computer networking fundamentals
- Discovering vulnerabilities
- Exploiting vulnerabilities in the network and application layer
- Exploiting vulnerabilities in web applications and wireless networks
This course is ideal for anyone just starting out in his or her journey into the exciting world of penetration testing and hacking or for those who work in an environment where they "need" to understand what attackers are doing and how attacks work.
What's new for 2016?
In what is our biggest change to training at Blackhat in over 15 years, we've moved our entire training operation into Amazon's AWS cloud.
This means that each student signing up to our courses gets access to their own training environment, allowing for as much haxory and experimentation, without other students being impacted or impacting you. We've also strived to make the theory as practical as possible and break away from death by slides.
It means we are able to move our training away from having "theory sections" and "practical sections" to a full course of pure pwnage.
This course is ideal for anyone just starting out in their journey into the exciting world of penetration testing and hacking or for those who work in an environment where they "need" to understand what attackers are doing and how attacks work.
Students need to ensure they are comfortable with Internet fundamentals (how is it made, how does it work), networking fundamentals and also operating system fundamentals. We will supply a series of pre-training information to you so you can study beforehand and be prepared when arriving at Blackhat.
No hacking experience is required for this course; this is a beginner's course. Enthusiasm is a must though!
Students should bring a laptop that is capable of running a Kali VMware image, has a Ethernet port available (or a USB Ethernet adapter) and a user that has administrator rights. Please do not bring any devices that contain "Corporate" information.
We have developed a training portal that will be made available to all students before they attend Blackhat. This portal allows you to register an account and gain access to the slides used and any prerequisite information we feel would help you get the best out of this course. All content for the course, including tools required and instructions to configure your environment, will be made available via the training portal before you start, which means less time setting up and more time for learning.
Access to this portal will not stop once the course has finished, allowing you to continue learning in the weeks/months after Blackhat.
All trainers are working analysts in the offensive realm. From stalking corporates to writing malware, infiltrating networks and exfiltrating data, the trainer is well-versed in doing this on a daily basis.
All trainers are working analysts in the offensive realm. From stalking corporates to writing malware, infiltrating networks and exfiltrating data, the trainer is well-versed in doing this on a daily basis.