In this Penetration Testing training course you learn how hackers compromise operating systems and evade antivirus software. You will learn to discover weaknesses in your own network by using the same mindset and methods as hackers. You then acquire the skills to test and exploit your defences and implement countermeasures to reduce risk in your enterprise.
TRAINING AT YOUR SITE
Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.
Jun 16 - 19 9:00 AM - 4:30 PM MDT Denver / Online (AnyWare) Reserve Your Seat
Jul 7 - 10 9:00 AM - 4:30 PM EDT Alexandria, VA / Online (AnyWare) Reserve Your Seat
Aug 18 - 21 9:00 AM - 4:30 PM EDT Herndon, VA / Online (AnyWare) Reserve Your Seat
Sep 29 - Oct 2 9:00 AM - 4:30 PM EDT New York / Online (AnyWare) Reserve Your Seat
Oct 27 - 30 9:00 AM - 4:30 PM EDT Greenbelt,MD / Online (AnyWare) Reserve Your Seat
Dec 1 - 4 9:00 AM - 4:30 PM MST Denver / Online (AnyWare) Reserve Your Seat
Feb 16 - 19 9:00 AM - 4:30 PM EST Herndon, VA / Online (AnyWare) Reserve Your Seat
Mar 29 - Apr 1 9:00 AM - 4:30 PM EDT New York / Online (AnyWare) Reserve Your Seat
Guaranteed to RunWhen you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time — will run. Guaranteed.
Acquiring target information
Scanning and enumerating resources
Correlating weaknesses and exploits
Leveraging opportunities for attack
Bypassing router Access Control Lists (ACLs)
Compromising operating systems
Subverting web applications
Baiting and snaring inside users
Manipulating internal clients
Deploying the social engineering toolkit
Initiating remote shells
Pivoting and island–hopping
Pilfering target information
Uploading and executing payloads
Masquerading network traffic
Evading antivirus systems
Penetration testing tests a computer system, network or web app to make sure there are not any vulnerabilities that a potential attacker could use.
Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.