Stepping into Security

Stepping into Security is our introductory course offering, intended for those who are interested in security but have limited programming experience, or those who want an introduction to a breadth of topics in the field of cybersecurity.

In this course, you will learn what cybersecurity is, the basics of various subjects in cybersecurity, some penetration testing skills and tools, and basic methods used to protect against hackers.

Syllabus (by session)

TopicDate
Penetration Testing and Kali Linux20 June
Reconnaissance: Information Gathering and Enumeration21 June
Exploitation: Frontend web attacks27 June
Exploitation: Backend web attacks28 June
July 4th (Holiday)4-5 July
Exploitation: Attacking programs11 July
Exploitation: Password attacks, malware, and social engineering12 July
Exploitation: Attacking systems with Metasploit and Vulnerability Databases18 July
Post-Exploitation: Privilege Escalation & Domain Escalation19 July
Pentesting Lab25-26 July
Pentesting Lab1 August
Synthesis, Lab Solutions, and Awards2 August

This course will be hosted from June 20 to August 2 online, skipping the weekend of July 4. The sessions will be every Saturday and Sunday online.

Signups will be offered via a partnership with StemBoost Organization, and a portion of the proceeds from this course will go to them.

Signup Form (through StemBoost)

Challenge

This is the challenge to see if this course is for you.

While this course is designed for those with limited programming experience, Googling will be a necessity in both this course and the cybersecurity field.

As such, you should be able to solve at least 2/3 of the below challenges by Googling before registering for the course. Note that you are not expected to know any of these solutions by memory.

1. Write the "Hello World" program in C.

2. There is an easter egg in this page. Right click → Inspect Element on the page, then find it.

3. Run "ping localhost" on the command prompt or terminal. Explain what this does.