In this Penetration Testing training course you learn how hackers compromise operating systems and evade antivirus software. You will learn to discover weaknesses in your own network by using the same mindset and methods as hackers. You then acquire the skills to test and exploit your defences and implement countermeasures to reduce risk in your enterprise.
TRAINING AT YOUR SITE
Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.
Oct 29 - Nov 1 9:00 AM - 4:30 PM EDT Online (AnyWare) Reserve Your Seat
Jan 7 - 10 9:00 AM - 4:30 PM EST Alexandria, VA / Online (AnyWare) Reserve Your Seat
Feb 4 - 7 9:00 AM - 4:30 PM EST Greenbelt,MD / Online (AnyWare) Reserve Your Seat
Feb 18 - 21 9:00 AM - 4:30 PM EST Herndon, VA / Online (AnyWare) Reserve Your Seat
Mar 31 - Apr 3 9:00 AM - 4:30 PM EDT New York / Online (AnyWare) Reserve Your Seat
May 5 - 8 9:00 AM - 4:30 PM EDT Greenbelt,MD / Online (AnyWare) Reserve Your Seat
May 19 - 22 9:00 AM - 4:30 PM EDT Rockville, MD / Online (AnyWare) Reserve Your Seat
Jul 7 - 10 9:00 AM - 4:30 PM EDT Alexandria, VA / Online (AnyWare) Reserve Your Seat
Jul 28 - 31 9:00 AM - 4:30 PM EDT Greenbelt,MD / Online (AnyWare) Reserve Your Seat
Aug 18 - 21 9:00 AM - 4:30 PM EDT Herndon, VA / Online (AnyWare) Reserve Your Seat
Guaranteed to RunWhen you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.
Acquiring target information
Scanning and enumerating resources
Correlating weaknesses and exploits
Leveraging opportunities for attack
Bypassing router Access Control Lists (ACLs)
Compromising operating systems
Subverting web applications
Baiting and snaring inside users
Manipulating internal clients
Deploying the social engineering toolkit
Initiating remote shells
Pivoting and island–hopping
Pilfering target information
Uploading and executing payloads
Masquerading network traffic
Evading antivirus systems
Penetration testing tests a computer system, network or web app to make sure there are not any vulnerabilities that a potential attacker could use.
Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.
Your Training Comes with a 100% Satisfaction Guarantee!*
*Partner-delivered courses may have different terms that apply. Ask for details.