PENTESTING WITH OPEN SOURCE TOOLS
This is a program designed to provide participants with the tools and techniques necessary for them to act as ethical pentesters or hackers in an organization, or even for those curious about the world of Information Security, who wish to understand how in the real world a malicious attacker can take control of their information; This course has the advantage of dealing with advanced topics from a practical point of view.
This course seeks to make an approach of the people who are in the world of the Computer science towards the world of the Hackers, so that they understand and put in practice the methods, mechanisms, tools and to take action on their attackers and from this perspective to be able to improve their schemes of protection, security and defense.
Students must have a background in TCP/IP, Networks and Operating Systems of Microsoft and Linux
- Recognition and fingerprinting.
- Scanning of Ports and Services.
- Listing and Analysis of Vulnerabilities.
- Device and service hacking.
- Malware use.
- Evasion an persistence techniques.
- Wireless attacks.