Pentester Training

About the training

Gain the essential knowledge and technical skills to start your dream career as a pentester. Learn by working on real projects, through workshops in small groups, under the guidance of our cybersecurity experts to ensure you get feedback on your progress and help if you need it.

After completing the course, you’ll get not only a diploma of your accomplishment but also the opportunity to join our team and further hone your skills among top talents in cybersecurity and pentesting.

After completing the pentesting course you’ll:

yes

have practical knowledge about the most significant web application vulnerabilities

yes

know the practical use of pentesting tools such as Burp Suite or Nmap

yes

be familiar with web application penetration testing methodology

yes

get a chance to join our company

Faq picture

What does our pentesting course include?

Key Highlights

nasza idea

3 months of online workshops

nasza idea

Small groups and a mentorship approach

nasza idea

Working on real-life projects

What’s the course outline?

The initial training is conducted over 3 days and consists of theoretical as well as practical classes, with the emphasis on the latter. After the training, the participants will be given several tasks to complete on their own, within the next 2 months. These tasks will be as follows:

- completing a penetration test for a pre-set web application, identifying potential vulnerabilities and preparing a report for a customer,
- completing a penetration test for a real web application that’s been released to production and preparing a test report for the project team,
- completing a checklist including a few smaller tasks that will help you reinforce what you’ve learnt during the training, such as completing a DNS Zone Transfer or preparing a map of vulnerabilities and safeguards.

During the time needed for completing this homework, the trainer will be available for consultations and advice.

"I'd like to invite anyone likes brain puzzles, issues that seem to be unsolvable, and anyone who’s passionate about cybersecurity for a pentesting course where I’ll share all I know about the common mistakes in web app security and where we’ll start developing your pentesting toolkit."

Grzegorz Trawiński, Instructor

Grzegorz Trawiński

Requirements

You’re eligible for this training if:

- you’ve worked on web applications as a QA Specialist for a minimum of 1.5 years,
- you’ve worked on web applications as a Software Developer for a minimum of 1.5 years,
- you have a hand-on experience with HTTP protocol.

Nice to have skills:
- knowledge of the Burp Suite
- knowledge of HTML and JavaScript
- practical knowledge of the OWASP TOP 10
- participation in training and certification of testing web applications

Do you meet the criteria?

Apply now
Kurs2 (1)

What’s ahead of you?

01
Send us your CV
02
Introductory talk with a recruiter to answer all your questions
03
Technical chat with the training instructor to check your knowledge level
04
Theoretical part: getting background for building strong skills
05
Practical part: working on real projects under the instructor’s guidance
06
Chance to join our Pentester team

Next edition of the course:

Coming soon

Do you want to participate? Fill in the application form now!

Price:

2500 PLN / 540 EUR

If you decide to work with us, we'll fully refund your course fee.

Number of places available:

5

Remote classes

bool(false)
Grzegorz Trawiński

Grzegorz Trawiński
PRINCIPAL SECURITY ENGINEER

I’ve been involved in IT since 2011. I’m an experienced programmer, architect, team leader, head of IT security, pentester. I was designing Enterprise class web and mobile applications, as well as securing IT systems for clients from the financial services industry from UK, Germany or Norway. Presently I’m performing penentration tests of IT solutions developed by international project teams from Big Four company. I’m extremely inquisitive and uncompromising in service quality delivery. Hobbistically, I smash hacktheboxes and CTFs. I support business from the IT security perspective, rationally implementing security controls and adequate educational programs for employees. I hold the OSCP, CISSP, CEH and ISO 27001 auditor certificates.

 

Registration is now closed. Stay tuned for the next edition.

 

Recruitment Team