Pentest. The practice of penetration testing or “ethical hacking”. New course from OTUS

Attention! This article is not engineering and is intended for readers who are interested in ethical hacking and training in this direction. Most likely, if you are not interested in learning, this material will not be of interest to you.


Penetration testing is the process of legal hacking of information systems in order to identify vulnerabilities in an information system. Pentest (i.e. penetration testing) takes place at the request of the customer, and upon completion, the contractor gives him recommendations on fixing vulnerabilities.

If you want to be able to recognize various types of vulnerabilities and protect network and web resources from malicious attacks, then Otus will teach you this. The set for the Pentest. Penetration Testing Practice

Who should use this course?

Programmers, network administrators, information security specialists, as well as recent students in the areas of "information security" and "security of automated systems."

You can take an entrance test to see if you can study in this course. Your knowledge is definitely enough if you:

  • Know the basics of TCP / IP
  • Know the basics of using the command line of Windows and Linux operating systems
  • Understand the work of client-server applications
  • You are the owner of the following hardware: RAM from 8 GB, high-speed Internet connection, 150 GB of free hard disk space

December 19 at 20:00 Open Day will be held, where the teacher of the Pentest. Penetration Practice ”- Alexander Kolesnikov (viral analyst at an international company) answer all questions on the course, talk in more detail about the program, online format and learning outcomes.

And according to the results of training, you will learn:

  • The main stages of penetration testing
  • Using modern tools for analyzing the security of an information system or application
  • Vulnerability Classifications and Fixes
  • Programming skills to automate routine tasks

The purpose of the course is to show in practice how a detailed analysis of network resources, software, web resources for vulnerabilities, their exploitation and further elimination is carried out.

To have an even clearer understanding of this course, you can familiarize yourself with past webinars:

“How to start dealing with bugs on the Web”

“All About the Course” (previous launch)

And also attend the open lesson “AD: basic concepts. How does BloodHoundAD work? ”To be held December 17 at 20:00. This webinar will discuss the basic concepts: What is AD, basic services, access control, as well as the mechanisms that are used by the BloodHoundAD utility.

See you on the course!

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *