What you'll learn:
- Report, document and properly index pentests
- Handle clients and unexpected situations during/after testing
- Web application pentesting
- Network petesting
- API pentesting
Why you want to take this course
Iam not one to keep my company secrets a secret, which kind of defeats the point of the word, but Istrongly believe in sharing knowledge. That's why Ihave created a guide that Ithink comprehensively covers this whole process. Pentesting is an art form and I'd like to teach how to do it.
What is this course?
This course takes you through 10 modules, each having it's own objective with a capstone assignment that will guide you through network pen-testing, web, and even APIpen-testing. I've created practical labs to guide you through the process so you are not just theoretically richer after completing this course.
Who am I?
Let's start with the obligated section about who Iam first. My name is Wesley Thijs and ihave been an instructor and public figure for about 4 years, garnering 100 000+students in my time doing it. Recently, however, Iwanted to expand my business and Iincluded pen testing as a service we offer. This means we also sometimes get requests for hundreds of hours of testing and this is impossible to do alone. Imanage a team of several highly skilled cybersecurity professionals Ihave been able to pick out over the years Ihave been training.
My team needed a standard way of testing and a standard education however so Icreated this plan to teach them how to pentest, how to handle clients, and everything involved in successfully completing an assignment from start to finish.