Stepping into Security is our introductory course offering, intended for those who are interested in security but have limited programming experience, or those who want an introduction to a breadth of topics in the field of cybersecurity.
In this course, you will learn what cybersecurity is, the basics of various subjects in cybersecurity, some penetration testing skills and tools, and basic methods used to protect against hackers.
|Penetration Testing and Kali Linux||20 June|
|Reconnaissance: Information Gathering and Enumeration||21 June|
|Exploitation: Frontend web attacks||27 June|
|Exploitation: Backend web attacks||28 June|
|July 4th (Holiday)||4-5 July|
|Exploitation: Attacking programs||11 July|
|Exploitation: Password attacks, malware, and social engineering||12 July|
|Exploitation: Attacking systems with Metasploit and Vulnerability Databases||18 July|
|Post-Exploitation: Privilege Escalation & Domain Escalation||19 July|
|Pentesting Lab||25-26 July|
|Pentesting Lab||1 August|
|Synthesis, Lab Solutions, and Awards||2 August|
This course will be hosted from June 20 to August 2 online, skipping the weekend of July 4. The sessions will be every Saturday and Sunday online.
Signups will be offered via a partnership with StemBoost Organization, and a portion of the proceeds from this course will go to them.
Signup Form (through StemBoost)
This is the challenge to see if this course is for you.
While this course is designed for those with limited programming experience, Googling will be a necessity in both this course and the cybersecurity field.
As such, you should be able to solve at least 2/3 of the below challenges by Googling before registering for the course. Note that you are not expected to know any of these solutions by memory.
1. Write the "Hello World" program in C.
2. There is an easter egg in this page. Right click → Inspect Element on the page, then find it.
3. Run "ping localhost" on the command prompt or terminal. Explain what this does.