
Corporate Labs - Software Update

Pentestit corporate laboratories are unique in their format and content practical IB training courses, developed on the basis of best practices for penetration testing and security analysis, comparable in content to materials from hacker conferences.
Specialists trained in Corporate Laboratories gain invaluable practical experience working with modern methods and tools to penetrate the system, study the psychology of attackers, conduct an investigation of cybercrimes, and, on the basis of this, learn to develop the most effective defense mechanisms. In the article we will tell you what is the uniqueness of our training program and what do specialists who have completed the Corporate Labs course get.
The Corporate Labs program is developed taking into account materials and practices used by both hackers and employees of information security departments of various companies. Listening to the wishes of the specialists who are studying with us, we regularly update the content of the course in such a way as to provide comfortable and high-quality training. For the same purposes, we developed our own platforms: a convenient personal account, a functional service for viewing webinars, unique pentest laboratories built on the basis of corporate networks of real companies.
Material Update
With each set, our specialists update the training material based on the development trends of modern threats and means of countering attackers. On average, 10-15% of the material is updated in each new training set.
When updating the material, we take into account the following factors:
- relevance of the material;
- updating or processing of technical equipment;
- the emergence of new vulnerabilities, and as a result, new attack vectors;
- high-profile cybersecurity event;
- wishes of students.
New program
Given the development of modern vectors and attack scenarios on corporate networks, we expanded our training program and added new webinars and practical exercises on the following topics:
Network Security in the IPv6 Age:
- Introduction to IPv6 Theory
- Scan and search for live IPv6 hosts
- man-in-the-middle in an IPv6 environment;
- IPv6 protection methods.
Android Security:
- Android security architecture and model
- application security (security sdk, permissions, ipc);
- reverse engineering applications;
- patching applications (application modification and reassembly).
Using Python in Penetration Testing:
- A brief introduction to Python
- work with network services;
- work with web applications.
Wireless Security:
- classic attacks on wireless networks;
- fake access points (Rogue AP, Evil Twin, Karma);
- detection of ether anomalies and detection of attacks;
- methods for protecting wireless networks.
Training
The course is completely remote. For the maximum comfort of students, we have developed a specialized webinar, a convenient personal account and a virtual laboratory environment, the connection to which is via a VPN connection.
The knowledge gained in the unique courses of ethical hacking and penetration testing from Pentestit is consolidated by completing tasks on hacking and protecting systems of varying complexity under conditions close to real ones. During the training process, employees study the nature of vulnerabilities, exploitation tools, get acquainted with the psychology and tools of the attacker, and with protection methods.
Most of the specialists who have already trained at Pentestit Corporate Laboratories are active employees of large organizations (banks, government agencies, major Internet projects) and regularly improve their professional level in the field of practical information security.
Find out more and sign up for the next courses here .