Pentester Training – Practical Penetration Testing and IT Security

Level

Intermediate

Duration

24h / 3 days

Date

Individually arranged

Price

Individually arranged

Pentester Training – Practical Penetration Testing and IT Security

The Pentester – Practical Penetration Testing and IT Security training is a comprehensive workshop that prepares you to independently conduct security testing of applications, networks, and IT infrastructure. During the course, you will learn the key aspects of web, mobile, and operating system security, gain the ability to identify weak points, and effectively exploit vulnerabilities. Throughout the training, you will work with tools commonly used in the daily work of pentesters (Nmap, Wireshark, Burp Suite, Metasploit) and acquire knowledge aligned with industry best practices (including OWASP Top 10).

Who is this training for?
  • logo infoshare IT specialists who want to start working in penetration testing
  • logo infoshare System administrators and engineers who want to improve the security of their infrastructure
  • logo infoshare Developers and architects of web and mobile applications
  • logo infoshare People preparing for roles in cybersecurity or certifications such as CEH, OSCP

What You Will Learn

  • How to understand application architecture and identify its weak points
  • How to detect vulnerabilities in network services and web/mobile applications
  • How to apply risk assessment models (STRIDE, DREAD, CVSS) in a security context
  • How to use key pentesting tools (Nmap, Wireshark, Burp Suite, Metasploit)
  • How to conduct penetration tests following the stages: planning, execution, reporting
  • How to create recommendations and reports after tests in line with best practices

Training Program

  1. Day 1: Basics of Applications and Networks

  • Module 1: Understanding Application Functioning

    • Application workflow
    • Key application components
    • Typical communication issues between components (weak points)
  • Module 2: Network Services – Fundamentals

    • TCP/IP protocol
    • OSI model layers
    • Key network services and their use
    • Common vulnerabilities of network services
  • Module 3: Basics of Network Security

    • Network security models
    • Firewalls, IDS/IPS
    • Network segmentation
    • Common threats and detection methods
  1. Day 2: Risk Management and Application Security

  • Module 4: Risk Management in IT Security

    • Definition of risk
    • Risk identification and assessment methods
    • Risk assessment models:
      • STRIDE
      • DREAD
      • CVSS
  • Module 5: OWASP Top 10 – Application Security Approach

    • Overview of OWASP Top 10 threats
    • Application testing in the OWASP context
    • Examples of real-world vulnerabilities
  • Module 6: Penetration Testing of Network Infrastructure

    • Goals and scope of infrastructure penetration tests
    • Scanning techniques and weakness detection
    • Examples of attacks and analysis
  1. Day 3: Penetration Testing and System Security

  • Module 7: Windows System Security

    • Security settings and system policies
    • Permissions and access control management
    • Incident detection and response
  • Module 8: Basic Kali Linux Tools for Pentesters

    • Nmap
    • Wireshark
    • Burp Suite
    • Metasploit
    • Using tools in security testing
    • Practical usage scenarios
  • Module 9: Mobile Application Security

    • Security threats specific to iOS and Android
    • Mobile application testing methods
    • Client-side and server-side security
  • Module 10: Web Application Security

    • Web application architecture
    • Common attack points
    • Programming mistakes and common vulnerabilities
    • Tools and techniques for web application testing
  • Module 11: Conducting Penetration Tests (Pentests)

    • Stages of penetration testing:
      • Planning
      • Execution
      • Reporting
    • Ethical aspects of penetration testing
    • Documentation and post-test recommendations

Contact us

we will organize training for you tailored to your needs

Przemysław Wołosz

Key Account Manager

przemyslaw.wolosz@infoShareAcademy.com

    The controller of your personal data is InfoShare Academy Sp. z o.o. with its registered office in Gdańsk, al. Grunwaldzka 427B, 80-309 Gdańsk, KRS: 0000531749, NIP: 5842742213. Personal data are processed in accordance with information clause.