RED TEAM DEVELOPMENT PROGRAM

The BIC Red Team Development Program seeks to add to the growing number of Offensive Security Professionals. This program includes both in-house programs and classes as well as external organizations or instructors that come to instruct.
Questions? Interested in Leading? Contact the RTDP Department Director: bicconf.ctf.noc@gmail.com

CURRENT COURSES

 

 

ZB102: 30-day training program on Practical Security Researching

Instructor: Empress O.

REGISTRATION IS IN THE ONLINE COMMUNITY.

This curriculum is designed to bring you from the ground up to becoming Bug Bounty/CTF player.

You will learn most of the important tools and techniques used to test the security of applications  and network. Students will learn how to use professional tools to practice enumerating and exploiting known vulnerabilities as well as discovering new “bugs”. This course will also look at reporting and responsible disclosure, to ensure the delivery of competent security  penetration test / bug discovery reports with concise description, evidence and  recommendation. 


Learning Outcomes:  
 

On the successful completion of the course, students will learn:  
 

1. How to perform basic foot printing and reconnaissance. 
 

2. Network and service enumeration on a wide variety of systems and services. 3. Vulnerability Analysis and exploitation techniques. 
 

4. Privilege escalation techniques. 
 

5. How to test for and exploit OWASP top 10 web application vulnerabilities. 6. How to write quality bug / penetration testing reports. 
 

Course Policies : Virtual Classroom Culture 
 

Success in this course will depends on your attitude and eagerness to learn. In order to get the  most from the class, students are required to: 
 

1. Sign into the virtual class on time. 
 

2. Stay for the entire duration of the class. 
 

3. Be fully present in the class as distractions will only have adverse effects for the students. 4. Always come to the class with computers. The use of mobile phones to join the class meetings is strongly discouraged. 

Integrity 
 

Since your assignments, quizzes, and exams will be conducted in an open-book, open-note  format. All work on assignments, quizzes, and exam should be your own. Submitting someone  else's work as your own is a serious form of academic dishonesty. You should always give credit,  and site sources appropriately. In your journey to be a cyber security expert this is especially  important.  
 

Attendance 
 

Attendance is required. A chunk of your final grade is based on your presence in the virtual  classroom. Granted there may be days where unavoidable circumstances may delay or prevent  you from making it to class but missing more than 2 classes might jeopardize your chances of  achieving the full 25% attendance score. 
 

Responsibility 
 

Everyone in the training is expected to participate in all assigned activities and to work hard to  develop a mastery of the InfoSec and OffSec concepts that are presented in the mini lectures.  Your participation in class discussions and your submissions of assignments and completions of  quizzes and exam should provide tangible evidence that you have achieved a sophisticated  understanding of OffSec concepts.  

Students are responsible for all assignments, even if they are absent. Late papers, failure to  complete the readings assigned for class discussion, and lack of preparedness for in-class  discussions and presentations will jeopardize your successful completion of this course. 

download (5)_edited.png
IMG_0881.PNG