Penetration Testing Training: Tools and Techniques

Level: Intermediate
Rating: 4.7/5 4.71/5 Based on 228 Reviews

In this Penetration Testing training course you learn how hackers compromise operating systems and evade antivirus software. You will learn to discover weaknesses in your own network by using the same mindset and methods as hackers. You then acquire the skills to test and exploit your defences and implement countermeasures to reduce risk in your enterprise.

Key Features of this Penetration Testing Training:

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

You Will Learn How To:

  • Deploy ethical hacking to expose weaknesses in your organization
  • Gather intelligence by employing reconnaissance, published data, and scanning tools
  • Test and improve your security by compromising your network using hacking tools
  • Protect against privilege escalation to prevent intrusions



Choose the Training Solution That Best Fits Your Individual Needs or Organizational Goals


In Class & Live, Online Training

  • 4-day instructor-led training course
  • One-on-one after-course instructor coaching
  • Tuition can be paid later by invoice -OR- at the time of checkout by credit card
View Course Details & Schedule

Standard $3285

Government $2890




Team Training

  • Bring this or any training to your organization
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Customize Your Team Training Experience


Save More On Training with FlexVouchers – A Unique Training Savings Account

Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.

In Class & Live, Online Training

Time Zone Legend:
Eastern Time Zone Central Time Zone
Mountain Time Zone Pacific Time Zone

Note: This course runs for 4 Days

  • Oct 29 - Nov 1 9:00 AM - 4:30 PM EDT Online (AnyWare) Online (AnyWare) Reserve Your Seat

  • Jan 7 - 10 9:00 AM - 4:30 PM EST Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

  • Feb 4 - 7 9:00 AM - 4:30 PM EST Greenbelt,MD / Online (AnyWare) Greenbelt,MD / Online (AnyWare) Reserve Your Seat

  • Feb 18 - 21 9:00 AM - 4:30 PM EST Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

  • Mar 31 - Apr 3 9:00 AM - 4:30 PM EDT New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • May 5 - 8 9:00 AM - 4:30 PM EDT Greenbelt,MD / Online (AnyWare) Greenbelt,MD / Online (AnyWare) Reserve Your Seat

  • May 19 - 22 9:00 AM - 4:30 PM EDT Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Reserve Your Seat

  • Jul 7 - 10 9:00 AM - 4:30 PM EDT Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

  • Jul 28 - 31 9:00 AM - 4:30 PM EDT Greenbelt,MD / Online (AnyWare) Greenbelt,MD / Online (AnyWare) Reserve Your Seat

  • Aug 18 - 21 9:00 AM - 4:30 PM EDT Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time, location — will run. Guaranteed.

Important Penetration Testing Course Information

Penetration Testing Course Outline

  • Introduction to Ethical Hacking

    • Defining a penetration testing methodology
    • Creating a security testing plan
  • Footprinting and Intelligence Gathering

    Acquiring target information

    • Locating useful and relevant information
    • Scavenging published data
    • Mining archive sites

    Scanning and enumerating resources

    • Identifying authentication methods
    • Harvesting e–mail information
    • Interrogating network services
    • Scanning from the inside out with HTML and egress busting
  • Identifying Vulnerabilities

    Correlating weaknesses and exploits

    • Researching databases
    • Determining target configuration
    • Evaluating vulnerability assessment tools

    Leveraging opportunities for attack

    • Discovering exploit resources
    • Attacking with Metasploit
  • Attacking Servers and Devices to Build Better Defences

    Bypassing router Access Control Lists (ACLs)

    • Discovering filtered ports
    • Manipulating ports to gain access
    • Connecting to blocked services

    Compromising operating systems

    • Examining Windows protection modes
    • Analyzing Linux/UNIX processes

    Subverting web applications

    • Injecting SQL and HTML code
    • Hijacking web sessions by prediction and Cross–Site Scripting (XSS)
    • Bypassing authentication mechanisms
  • Manipulating Clients to Uncover Internal Threats

    Baiting and snaring inside users

    • Executing client–side attacks
    • Gaining control of browsers

    Manipulating internal clients

    • Harvesting client information
    • Enumerating internal data

    Deploying the social engineering toolkit

    • Cloning a legitimate site
    • Diverting clients by poisoning DNS
  • Exploiting Targets to Increase Security

    Initiating remote shells

    • Selecting reverse or bind shells
    • Leveraging the Metasploit Meterpreter

    Pivoting and island–hopping

    • Deploying portable media attacks
    • Routing through compromised clients

    Pilfering target information

    • Stealing password hashes
    • Extracting infrastructure routing, DNS and NetBIOS data

    Uploading and executing payloads

    • Controlling memory processes
    • Utilizing the remote file system
  • Testing Antivirus and IDS Security

    Masquerading network traffic

    • Obfuscating vectors and payloads
    • Side–stepping perimeter defences

    Evading antivirus systems

    • Discovering stealth techniques to inject malware
    • Uncovering the gaps in antivirus protection
  • Mitigating Risks and Next Steps

    • Reporting results and creating an action plan
    • Managing patches and configuration
    • Recommending cyber security countermeasures

Team Training

Penetration Testing Training FAQs

  • What is penetration testing?

    Penetration testing tests a computer system, network or web app to make sure there are not any vulnerabilities that a potential attacker could use. 

  • Can I take this Network Security course online?

    Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.

Questions about which training is right for you?

call 888-843-8733
chat Live Chat

100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

  • If you are not 100 % satisfied, you pay no tuition!
  • No advance payment required for most products.
  • Tuition can be paid later by invoice - OR - at the time of checkout by credit card.

*Partner-delivered courses may have different terms that apply. Ask for details.

Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Greenbelt,MD / Online (AnyWare)
Herndon, VA / Online (AnyWare)
New York / Online (AnyWare)
Greenbelt,MD / Online (AnyWare)
Rockville, MD / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Greenbelt,MD / Online (AnyWare)
Herndon, VA / Online (AnyWare)
Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français