Pease answer the following questions

The agenda of this training will be the following :

Day 1 - Basics

   - Introduction to Kali Linux
   - Active and Passive Recon
   - Scanning and Enumeration
   - Vulnerability Mapping
   - Exploitation with Metasploit
   - Man-in-the-Middle Attacks
   - Pivoting and Post-Exploitation
   - Offline Password Cracking
   - Hacking Wireless Networks

Day 2 - Advanced
   - Advanced Password Attacks
   - Pass-the-Hash Techniques
   - Kerberos Token Impersonation
   - Extracting Windows Credentials
   - Hacking WPA/WPA2/WPS
   - Rogue Access Points
   - Device: the WiFi Pineapple
   - Anatomy of an Exploit
   - Hacking Windows 10/2012
   - Malware and Social Engineering
   - Client-Side Exploits (e.g. Flash)
   - Attacking Mobile Devices

Day 3 - Web Applications
   - Introduction to Web Applications
   - Pentesting and Methodologies
   - OWASP and the Top 10 Risks
   - Vulnerabilities and Exploitation
   - Post-Exploitation and Webshells
   - Local Privilege Escalations
   - Vulnerability Detection
   - Web Application Scanners
   - Intercepting Proxies
   - Web Server Hardening

Prerequisites :
   - Own laptop is required (!)
   - Windows, Mac OS X, or Linux
   - Administrator privileges
   - Ethernet and USB interface
   - Ability to disable AV and IPS
   - VMware Player/Fusion installed

   - Basic knowledge in TCP/IP

This training will be held at abnetwork.

Question Title

* 1. Do you intend to attend this training ?

Question Title

* 2. Please provide your contact details

T