COURSE OUTLINE

Session 5-6

Network vulnerabilities

Session 7-8

Client Side vuln 

Session 10

Common attacks on block ciphers and hashes (based on matasano)
Labs extending the theme (CBC, CTR, length extension)

Session 9

Automated Tools

Session 11

PRNG misconceptions and attacks on PRNGs
Labs extending the theme (MT19937, DUAL EC DRBG, LCG)

Session 12

Asymmetric Cryptography attacks
Labs extending (attacks on RSA, DSA, EC)

Session 4

Mobile App Pentesting

Session 3

Web App Pentesting

Session 1

Recon Stage and Tools

Session 2

Web App Pentesting

Session 14

Volatility, yara, sleuth kit (tools)

Session 13

Incident Response first steps.
Dumping the memory, dumping the disks, first steps you can take to discover activity while the dumping process is completing

Session 15

CTF.Zone Workshop/Final exam