• Internal Pentesting Methodology : From System Enumeration, Password Cracking to Privilege Escalation
• How to write a good pentesting report
• ECSA Course Overview
Guest Speaker: Belly Rachdianto, Certified EC-Council Instructor, LPT Master
As an Independent IT Consultant in Indonesia, have formal IT background from Politeknik INSTITUT TEKNOLOGI BANDUNG (Polytechnic of Bandung Institute of Technology) Indonesia, and from STMIK (Sekolah Tinggi Manajemen dan Informatika) INTI Indonesia in Computer Science. With thorough knowledge of Computer Technology and/or Information System Stuff for over 20 (twenty) years professional experiences, although started programming since 1984 (on Commodore, Apple IIe and IBM PC).
Working on many extensive and diverse in many large-scale, mission critical projects, including software engineering, system programming, application architecture, network infrastructure and security analysis, network design and implementation, and network management. Have deep skills and experiences in all aspects of network operating system platforms, internetworking devices, security and multi-service network convergence. Build many MIS/GIS Applications, OLTP, 3 Tier Application, Web Database, and GIS on the Internet. Have an ability to do system design, develop and implement, as well as able to create and deliver multimedia presentations. Good knowledge in Unix/Linux flavors, Microsoft Windows Family and Novell Network.
Attend our Live webinar session on 26/09/2020 3:30pm by clicking on the link here.