Masterclass: Introduction to Pen-testing Course


Wichtige Information

Dieses Seminar wird in ENGLISH gehalten!

Inhalt des Trainings

This course serves as an introductory course for performing internal and web application penetration testing.

Our course has been developed around professional penetration testing and security awareness in the business and IT fields. During the course you will learn how to pick the right methodology for your project and acquire the skills on how to successfully perform target reconnaissance and get valuable data on the objective.

Later on, we will go through various aspects of Web Application Pentesting and review the key concepts of web app security. We will also familiarize ourselves with Web Application pentester’s best friend: the Burp Suite. Afterwards we will go through the OWASP Top 10 for 2021 to get a better understanding of top vulnerabilities to look for during our work.

During the final stage of the training, we will guide you through various methods of infrastructure penetration testing. We will learn how to determine the attacks scope, discover vulnerable services and configurations. After we have successfully prepared for the pen-test, the next steps will be to weaponize and in this chapter we will undergo the preparation of malicious payloads and reverse shells. As soon as we have gained the access to the target system, we will try various methods of privilege escalation and lateral movement.

To make sure that all participants gain the necessary security concepts and knowledge, our classes have an intensive hands-on labs format and we have prepared tons of exercises that you will be able to perform even after the course concludes, as we will grant you an extra 3-weeks of lab access!

The knowledge used to prepare the unique content of this amazing course has been gathered during tons of penetration testing projects done all around the world by CQURE Experts. The training will allow you to understand the penetration tester’s perspective on security, and learn crucial tools and concepts needed for everyone considering developing their career in penetration testing or cybersecurity in general.


This course is ideal for junior pen-testers and red teamers
  • Windows network administrators
  • security professionals
  • systems engineers
  • developers
  • IT professionals
  • security consultants and other people responsible for implementing infrastructure security.


To attend this training, you should have at least 2-3 years of experience in IT-related job or at least 1 year of experience in cybersecurity field.


Introduction to Penetration Testing
  • Functional issue or security issue?
  • What is Penetration Testing?
  • What skills should Pentester have?
  • The best operating system, web browser and other tools
  • Cyber Kill Chain
Performing security testing
  • Testing methoologies
  • Measuring severity of an issue
  • Risk matrix and CVSS score
  • Vunlerabilities and Risks
  • The role of automatization
  • What defines a test scope?
  • How to create good report?
  • Useful reporting skills
  • Why is recon needed?
  • Open-Source Intelligence (OSINT)
  • Google hacking and alternative search engines
  • DNS and WHOIS databases
  • Subdomain enumeration
  • Social Media Intelligence (SOCMINT)
  • Public services enumeration
  • Discovering hidden secrets
Web Applications
  • Introduction to HTTP
  • Modern web applications, frameworks and web programming languages
  • Client and server-side security
  • The hidden gems of web browsers
  • The role of web-proxy

Introduction to Burp Suite
  • Tool overview
  • Community and Pro features
  • Basic web attacks using Burp Suite
  • Work automatization
  • Useful extensions

Introduction to Web Attacks
  • OWASP TOP 10 Project
  • OWAST TOP 10 2021
  • Discovering Access Control issues
  • Injection Attacks
  • Insecure file inclusions
  • Web attacks and Remote Code Execution

Infrastructure penetration testing
  • Infrastructure as entry point
  • Modern architercture
  • Introduction to TCP and UDP
  • Nmap - powerful port scanner
  • Ncat - netcat for 21st century
  • Vulnerable default configurations

Using and creating offensive security tools
  • Programing languages for offensive tasks
  • Types of shells
  • Generating reverse shell
  • Generating web shell
  • Bypassing firewalls
  • Finding Exploits
  • Reviewing and fixing public exploits

Security solutions on modern systems
  • Yara rules
  • Bypassing Anti-Virus and EDRs
  • Alternative file types
  • Living Off the Land Binaries

Privelage escalation
  • How Windows access control works?
  • Attacking services
  • Accessing system secrets
  • Mimikatz

Lateral Movement
  • Sniffing
  • Gathering network information
  • Bloodhound
  • Pass-The-Hash family attacks
  • Critical Active Directory issues



Ab  2.650,-*

*Preis pro Teilnehmer*in ohne Zusatzoptionen, exkl. MwSt.

Sie haben Fragen?

Ihr ETC Support

Kontaktieren Sie uns!

+43 1 533 1777-99