CURSO
Course start / opening date : February 15, 2021 (take advantage of the early registration discount!)
Exposure to the Internet of companies and businesses, 80% is based on web applications ( either as an information page, SSL VPN accesses, file servers etc.).
There is no greater weapon for prevention than a good attack.
The student, in this course, will not only learn the techniques most used by cybercriminals, but also You will also learn how to mitigate these vulnerabilities.
The course has a detailed syllabus, and in addition, each module has a laboratory that is will make available to the student to carry out the attacks in a controlled way, which, after all, is how you learn, practicing.
Upon completion of the course, students will have the necessary knowledge to begin their career in cybersecurity in the field of pentesting, ethical hacking or penetration testing.
What the student will receive:
- Files to connect to the VPN.
- Internal Moodle central server where you will have all the syllabus, explanations and questionnaires to be done at the end of each lesson.
- Access to laboratories with +30 hosts in order to put into practice what is learned during the course ( access for life ).
- Regular updates and unlimited access to the course.
- Access to the CTF only for students in which you will have more than 70 vulnerabilities to exploit, and find the flag (for 1 month).
- 24x7 support to answer any type of question. These doubts will be resolved in a period of less than 24 hours.
- Practical workshops at the end of each module.
- At the end of the course, the student must choose the day and time to take the final exam, 100% practical .
- WSHW Certification .
Temario
Módulo 1 – Introducción a la seguridad informática
Seguridad Informática en GeneralSeguridad Informática en General
Tendencia aplicaciones web
Pentesting VS Análisis de vulnerabilidades
Windows VS Linux
Kali Linux – Distro dedicada a Seguridad Informática
Módulo 2 – Recopilación de información
Whois Lookup
Descubriendo tecnologías utilizadas en sitios web
Recopilando información comprensiva sobre DNS
Descubriendo subdominios
Maltego
Nmap
Módulo 3 - Ataques básicos y conceptos passwords
Ataques de fuerza bruta – Diccionario
Html Injection
Verb Tampering
Métodos HTTP:
-TRACE
-OPTIONS
-PUT
BasicAuth (Apache)
Conceptos de contraseñas inseguras
Módulo 4 - Vulnerabilidades en la carga de archivos (uploads)
Solicitudes HTTP: GET y POST
Interceptando solicitudes HTTP (Burp)
Subida de archivos maliciosos vía:
1. Basic
2. Content-Type
3. Blacklist
4. Null Byte
5. Doble Extensión
6. GetImageSize
Mitigaciones vulnerabilidades carga de archivos (uploads)
Módulo 5: Top 10 OWASP
Que es OWASP
Ejecución de comandos (RCE)
SQL Injection
LFI (Local File Inclusion)
RFI (Remote File Inclusion)
Redirecciones (Redirects)
Mitigaciones
Módulo 6 - Frameworks
WordPress – Vulnerabilidades
-WPScan – Herramienta
-Remote Code Execution on WordPress
Joomla – Vulnerabilidades
-Joomscan – Herramienta
Módulo 7 – Herramientas Automatizadas
ZAP
Arachni
Acunetix
Burp Suite
Módulo 8 – Reporting
Presentación plantilla de informes
Creación de Informe Tipo
Conclusiones
Módulo 9 – Resumen del postgrado
Resumen del postgrado
Tips Examen
EXAMEN
Reviews
There are no reviews yet.