We will be using this time to learn the essentials for successfully performing a penetration test in the real world.
AGENDA:
- Recap: Scanning and Enumeration
- Network Attacks
- Exploiting Vulnerabilities
- Intro to Web Attacks
- Q/A
Keep in mind this is a 3 part series, but you can still engage with us for Chapter 2... even if you missed Chapter 1. We will also assist our attendees on how to leverage this experience to include it on your resume and prove it as cybersecurity experience.
Chapter 01 - The Beginning Stages to Hack
Chapter 02 - Time to Exploit
Chapter 03 - The Post-Exploitation Stage AKA The Aftermath
ESSENTIAL FOR ATTENDEES:
Make sure to bring your laptop with Kali Linux installed
The Kali Linux Virtual Machine is required to be installed on your laptop prior to attending the event. Without Kali Linux up and running on your laptop, you will not be able to participate for the hands-on lab.
Follow Us on Instagram @respectthetech_
Linkedin Page: Respect The Tech
Website: respectthetech.us