Basic Training: Performing Penetration Tests

Comprehensive introduction to penetration testing of IT systems, networks and IT infrastructures
This training provides answers to the following questions
- How do I approach a penetration test?
- How do I use the most powerful pentest tools?
- Which techniques have proven successful?
- How do I build my own toolkit?
Headline 3
Text 3
Description
The training includes a variety of practical exercises, for which our comfortable mobile training environment is used. The vulnerabilities are understood by the participants by solving tasks of varying degrees of difficulty and then discussed in the group.
The training environment allows participants to use their own laptop with their individual working environment, without artificial adaptation to the training environment. The use of a suitable pentest environment, such as Kali Linux or Blackarch, is recommended, but is not a requirement.
All content can be specifically adapted for you in consultation with you!
Course content
Fundamentals of information security
- Protection goals, identification and authentication models
- Attacker models
- Key concepts (Threat, Vulnerability, Risk, Controls, …)
- General penetration testing procedure
Information Gathering / Reconnaissance
- OSI/ISO Model, TCP/IP Model
- Netcat, Wireshark
- Ettercap, Arp spoofing, SSL MitM
- Intercepting mobile device traffic
- Nmap, Banner grabbing
- DNS Reconnaissance (forward lookup, reverse lookup)
- Network architectures, packet filters, firewalls, IDS/IPS
- File transfer, port redirection, stunnel
Exploitation
- Buffer Overflows, Server-side, Client-side
- Exploitdb, metasploit
- Privilege Escalation
- Trojan Horses, Antivirus Bypass
- Online Password Attacks (SMTP, SSH, HTML)
- Side Channel attacks, Anti-Automation
Cryptography
- Symmetric vs. asymmetric cryptography
- Hashing methods, password storage
- Public Key Infrastructure (PKI)
- SSL/TLS
- Testing (openssl, sslscan, o-saft)
- Offline brute-force (john, ophcrack)
This training is aimed at companies and organizations. It is individually tailored to your requirements and the team's prior knowledge and can be carried out in-house or online. This training can be economical from as few as three participants.
Target Group
Pentesters and those who want to become one
Duration & Format
- 2 to 5 days, individually tailored
- On-site or online training
Prerequisites
None
Our trainers
Our promise: from practice, for practice & always up to date. That's why all our trainers are active experts with many years of experience in the subject area they teach.
Your Benefit
Our training courses not only impart knowledge, they also change mindsets. Your developers will learn to identify security vulnerabilities early on and avoid them in a targeted manner. The result: more robust applications, more confidence - and a clear advantage in everyday project work.
All trainers are actively working Security Consultants. They contribute their experience with everyday problems, which often conflict with security requirements, and thus contribute to a pragmatic, realistic approach to security.
- Practical methods instead of theory to avoid typical security gaps in web applications and mobile apps.
- Content according to the latest standards by actively working, experienced Security Consultants.
- Secure coding for long-term maintainability and quality of the source code.
- Increased security awareness in the team prevents pitfalls at an early stage.
- Protection against liability risks & damage to reputation.





