top of page
Automated bug hunting

AUTOMATING BUG HUNTING

                                                       

Price: 

€1980

Duration: 

2 days

Format: 

Offline

Level: 

Intermediate

Denis Makrushin

Trainer 

Denis Makrushin

Denis Makrushin is a security researcher and consultant focusing on vulnerability assessment and product security. Denis formerly worked for Ingram Micro as the Head of Application Security. He built and implemented a product security program for an enterprise-scale platform used by companies from the Fortune 100 list.


More recently, as a Security Researcher with the Global Research and Analysis Team at Kaspersky, he focused on vulnerability research and security assessment of emerging technologies.


Denis has trained and presented at many international conferences, including Defcon, RSA Conference, Security Analyst Summit, and Infosecurity, as well as at multiple closed-door industry events. He holds a master's degree in Information Security from the National Research Nuclear University.

About the training: 

The processes behind web endpoint discovery and pivoting to the internal network via exploitation of advanced web attacks can be automated. In their daily routine bug hunters and security engineers use loads of handy tools and techniques that allow them to identify and bypass the various protection technologies used in application security. This training course will see you research the tools, techniques and procedures to exploit advanced web vulnerabilities. During this process you will build a platform to automate and orchestrate the bug hunting process.

Key takeaways:

  • Automate the discovery of bug exploitation in web-based scenarios

  • Learn techniques to bypass protections

  • Save time and effort on vulnerability assessment and pentesting

What you get after the training:

  • itrainsec shareable certificate, signed by the trainer (add it to your LinkedIn profile) 

  • Course materials 

  • Practical skill to elevate your career to the next level 

  • After-training consultancy and support 

  • Expansion of your professional network in the cybersecurity industry 

  • Stronger cybersecurity posture of your business

bottom of page