2 Day Intensive Hands-on Workshop on Ethical Hacking by Wattlecorp Cybersecurity Labs LLP
Pay the Advance 500 now
Date: 10th and 11th Aug 2019 (Saturday, Sunday)
Venue: Wattlecorp Cybersecurity Labs LLP,
1st Floor, Mobile10x Building,
Govt. Cyberpark, Kozhikode, India 673016
Duration : 18 hrs (2 Days – 9:00am to 6:00pm)
No of seats: 30
Prerequisite: A Head above your neck, the ability to think like a thief and a Laptop
Fee: INR 3000 (10% Off for Students)
- Participation Certificate
- E-Book ~ The Bad Boys Art Book by Wattlecorp
- E-Tool Kit
This workshop is intended to provide a practical approach to exchange best practices in the implementation of Ethical Hacking. It will provide an enriching experience for all the attendees who take part in this session. We believe that there is a hacker in everyone and we will help you to find the one inside you.
Hands-on Linux/Unix Basics (which is required to cover this workshop) : In this section, you will be introduced to basic coaching on UNIX, LINUX and KALI LINUX. By the end of this session, you will get familiar with the concepts of UNIX and LINUX, different distributions of LINUX as well as KALI LINUX, installation of KALI LINUX and its environment.
Ethical Hacking Methodology: In this session, you will hear ethical hacking/ pentest methodologies. We would cover different penetration testing tools and techniques that a pentester would require during different phases of testing.
Setting up a Penetration testing Lab environment: In this session, you will learn to set up your own hacking lab environment.
Hands-on Exercises on
Intelligence Gathering: In this session, we will learn about different tools and Techniques for gathering information from various targeted systems.
Enumeration and Scanning: This session would take you through different tools and techniques which are used in finding out Open Ports and enumerate services running in those ports. Also, you will get to learn how to find out the vulnerabilities on the target.
Exploitation: While coming to this session we would teach you how to exploit the target system based on the information and the vulnerabilities collected in the last 2 phases.
Post Exploitation: Here we will be learning about the Privilege Escalation, in order to gain more privilege in the exploited systems.
Capture the Flag Challenge at the end of the session.
For Workshop related Queries call : +91 7795151633 / +91 9847007838