Font size:

Ethical Hacking: Penetration Testing for Professionals

Network Security Training

Our most popular information security and hacking training goes in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises . While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization.

You leave with the ability to quantitatively assess and measure threats to information assets; and discover where your organization is most vulnerable to hacking in this network security training course.

What Is The Goal of This Course?

The goal of this course is to help you master a repeatable, documentable penetration testing methodology that can be used in an ethical penetration testing or hacking situation.

This ethical security training course has a significant Return on Investment, you walk out the door with hacking skills that are highly in demand, as well as the Certified Ethical Hacker certification!

The Most Current, Up-To-Date Ethical Hacking Training Available Anywhere!

Black Hat hackers are always changing their tactics to get one step ahead of the good guys. We update our course materials regularly to ensure that you learn about the most current threats to your organization''s networks and systems.

Learn From Experts in the Field of Information Security

We don''t just have great instructors, our instructors have years of industry experience and are recognized as experts. Our instructors have authored two of the top Network Security and Ethical Hacking books!

Run Hacking Attacks in Our Classroom Labs... Be a Hacker For a Week!

Some of the hacking concepts you will learn to master during this hands on hacking course are:
  • Penetration testing methodologies
  • Stealthy network recon
  • Passive traffic identification
  • Remote root vulnerability exploitation
  • Privilege escalation hacking
  • IPv6 Vulnerabilities
  • Remote access trojan hacking
  • Running shellcode in RAM vs. on disk
  • Wireless insecurity
  • Breaking IP-based ACLs via spoofing
  • Abusing Windows Named Pipes for Domain Impersonation
  • Evidence removal and anti-forensics
  • Attacking network infrastructure devices
  • Hacking by brute forcing remotely
  • Hiding exploit payloads in jpeg and gif image files
  • Hacking Web Applications
  • Breaking into databases with SQL Injection
  • Cross Site Scripting hacking
  • Hacking into Cisco routers
  • Justifying a penetration test to management and customers
  • CEH/CPT review
  • Defensive techniques
Topics That Will Be Covered

Some of the instructor-led hands-on hacking lab exercises in this security training experience inlcude:
  • Capture the Flag hacking exercises every night
  • Abusing DNS for host identification
  • Leaking system information from Unix and Windows
  • Windows 2003 Server & Vista DNS Cache Poisoning Attacks
  • Unix, Windows and Cisco password cracking
  • Remote buffer overflow exploit lab - heap vs. stack overflows
  • Attacking Kerberos Pre-Auth Hashes
  • Spoofing endpoints of communication tunnels
  • Impersonation of other Users- Hijacking kernel tokens
  • Attacking RDP (Remote Desktop Protocol) in Windows XP, 2003 & Vista
  • Remote key-logging
  • Data mining authentication information from clear-text protocols
  • Sniffing and hijacking SSL encrypted sessions
  • Breaking wireless security via hacking
  • Malicious event log editing
  • Client side IE & Firefox exploits
  • Tunneling through IPSec VPNs by abusing ESP
  • Data retrieval with SQL Injection Hacking
  • Calculating the Return on Investment (ROI'
Register Now
Ethical Hacking: Penetration Testing and Certified Ethical Hacker Online course
  • Course ID:
    197707
  • Duration:
    n/a
  • Price:
    $4,973