INE ONLINE BOOTCAMP
Cyber Security: Recon and Vulnerability Detection
March 17th - 19th , 11:00 AM - 2:00 PM Eastern
Get started here
INE Bootcamps are available to Premium and Business subscribers
Don’t have a subscription?
ABOUT THE INSTRUCTOR
Phillip Wylie
Phillip has over two decades of information technology and cybersecurity experience. His specialties include penetration testing and application security. When Phillip is not hacking, he is educating others. Phillip is the founder of The Pwn School Project, an education-focused cybersecurity organization. He co-authored the book, “The Pentester Blueprint: Starting a Career as an Ethical Hacker” based on his popular talk presented at numerous industry events. He is an Innocent Lives Foundation Ambassador and a ‘Hacking is NOT a Crime’ Advocate. Phillip’s uncommon journey into the field of cyber security is preceded by his colorful past as a pro wrestler, where he once wrestled a bear.
ITINERARY
DAY 1 [11:00 AM - 2:00 PM]
- Day 1 - Passive Reconnaissance
- Pentesting Methodology Overview (15 minutes)
- Penetration Testing Execution Standard (PTES)
- Information Gathering (15 minutes)
- Information Gathering Introduction
- Passive Information Gathering/Open Source Intelligence
- Active Information Gathering
- Web Presence (30 minutes)
- Search Engines
- Social Media
- Internet Archive aka Wayback Machine
- Break (15 minutes)
- Information Gathering Exercises (30 minutes)
- Q&A (15 minutes)
DAY 2 [11:00 AM - 2:00 PM]
- Day 2 - Active Reconnaissance
- Infrastructure (15 minutes)
- Domains
- Whois
- DNS Enumeration (15 minutes)
- DNS Lookup
- DNS Record Types
- Reverse Lookup
- Zone Transfers
- IP Enumeration (15 minutes)
- Identifying Live Hosts (15 minutes)
- Break (15 minutes)
- Active Reconnaissance Exercises (15 minutes)
- Netblocks and Autonomous Systems (15 minutes)
- Q&A (15 minutes)
DAY 3 [11:00 AM - 2:00 PM]
- Day 3 - Footprinting, Scanning, and Vulnerability Analysis
- Mapping a Network (15 minutes)
- Port Scanning (15 minutes)
- Break (15 minutes)
- Vulnerability Scanning (30 minutes)
- Footprinting, Scanning, and Vulnerability Analysis Exercises (30 minutes)
- Q&A (15 minutes)
- Evaluation