Цитата:
Сообщение от zedix
Thank you for so full and informative post! I really like it. Theme of this topic is very overall, so for every skill you wrote there, it is possible to write individual post to cover this skill in more detail.
P.S. sorry for my english.
|
Thank you for the feedback. Ya govoriu po russki, no u menia netu russkoy klaviaturi, a translitom (to est ne prosto kak seychas a eshe i perevodit latinnitsu na russkie bukvi) pisat ochen medlenno. To est, dlia menia mozhno pisat po russki i ya poimu, no mne samomu legche pisat po angliyski, potomu chto u menia US keyboard.
I have experience with writing information security training materials on a professional level. Major international corporations pay a lot of money to study my work. I've also done penetration testing on a professional level and the company that I work for does penetration testing, but it's another department - I work in the online learning department.
In other words, I can easily put together a training course about (virtually) any subject relevant to information security, because I do that kind of stuff every day anyway. I can also tell you if a course is good or not. I would not recommend taking any of the courses that you've mentioned here so far - they will not teach you what you will actually be doing as a penetration tester, which is going to be a lot of writing and some programming, in addition to the actual testing. You have to at least be able to read code and understand the issues that cause vulnerabilities. It is not enough to just find a hole, especially if you are using an automated tool to do it, you have to also explain what caused it and how to fix it.
The information that you have collected here is useful to me, so please continue, and maybe I'll put together an outline of what in my opinion is a useful penetration testing course.
I'm an information security professional with a lot of experience and I'm interested in networking with the next generation of professionals, so I have some interest in helping you succeed in this field.
PRO-Tip: Instead of CTF, I recommend setting up virtual machines with different OS, installing popular applications with known vulnerabilities, and then breaking into them. For example, you can install a WordPress with a vulnerable plugin and then write an exploit to break into it. You will gain real world sysadmin knowledge, understanding of real-world design errors, and real-world application design patterns - you will see real database schemas, real filesystem structures and real code.
I recommend focusing on studying web applications. For network penetration testing, you're not really going to do things much differently from an automated scanner. Most of the time you also don't really need to go deep into the system, in fact your customer will probably not want you to go in deep, they'll just want you to find the holes in the application and explain how to fix them.