Schoolhouse.world: peer tutoring, for free.
Free SAT® Prep, as part of a research study.
SAT® Bootcamps
Free SAT® Prep, as part of a research study.
A global network of volunteers.
Explore Tutors
A global network of volunteers.

Computer Science • Series

Ethical Hacking - Red Teaming

Jose G

Series Details

Sessions

Public Discussion

This series ended on November 10, 2024. All 1:1 and group chats related to this series are disabled 7 days after the last session.

Series Details

About

This course provides an in-depth exploration of Red Teaming methodologies in ethical hacking. Participants will learn offensive security techniques, including penetration testing and vulnerability exploitation. Each week will feature hands-on labs and real-world case studies, allowing learners to practice skills in simulated environments. Through interactive discussions and practice, participants will gain the knowledge and experience necessary to identify and exploit security weaknesses effectively for ethical purposes only.

✋ ATTENDANCE POLICY

While attendance is important, we understand that life can be unpredictable. You have the freedom to attend or skip any sessions, but consistent participation is encouraged to make the most of your learning experience.

Dates

November 2 - November 10

Learners

4 / 10

Total Sessions

4

About the Tutor

Hello! I'm a developer working at a startup in the USA. I'm originally from Ecuador. In my free time, I'm an ethical hacker ranked in the top 1% on TryHackMe. I'm here to prepare for the SAT and help others along the way. I'm passionate about technology and always eager to learn and contribute to the community!

View Jose G's Profile

Upcoming Sessions

0

Past Sessions

4
2
Nov

Session 1

Other Topics

Session 1: Introduction to Ethical Hacking

Description: In this session, we'll explore the fundamentals of penetration testing and its importance in cybersecurity. Participants will understand the roles and responsibilities of a red teamer and the ethical considerations involved.

Topics to Cover: Overview of penetration testing
  • Red Team vs. Blue Team dynamics
  • Ethical considerations and legal implications
  • Penetration testing methodologies (OWASP, NIST)
3
Nov

Session 2

Other Topics

Session 2: Reconnaissance Techniques

Description: This session will focus on the first phase of the penetration testing lifecycle: reconnaissance. Participants will learn about information gathering and reconnaissance techniques to identify potential targets.

Topics to Cover:
  • Passive vs. active reconnaissance
  • Tools for reconnaissance (e.g., WHOIS, nslookup, recon-ng)
  • Social engineering basics
  • Building a reconnaissance report
10
Nov

Session 3

Other Topics

Session 3: Scanning and Enumeration

Description: Participants will dive into scanning and enumeration techniques to identify open ports and services on simulated target systems. This session will cover various scanning tools and methods.

Topics to Cover:
  • Network scanning techniques (e.g., Nmap)
  • Service enumeration and banner grabbing
  • Analyzing scan results

Session 4

Other Topics

Session 4: Gaining Access

Description: In this session, learners will explore exploitation techniques to gain unauthorized access to target systems. They will practice using various tools and methods to exploit vulnerabilities.

Topics to Cover:
  • Exploit frameworks (e.g., Metasploit)
  • Common exploitation techniques (e.g., buffer overflow, SQL injection)
  • Web application attacks (e.g., Cross-Site Scripting, CSRF)
  • Demonstration of successful exploitation

Public Discussion

Please log in to see discussion on this series.