Font size:

In this series, Daniel and Mike discuss, explain, and demonstrate some of the common tools and techniques used by Penetrations Testers during a security audit. Watch as they explore topics like hacking platforms and test environments, creating BIND/REVERSE shells, discovering and exploiting Buffer Overflows, Cross Site Scripting attacks, Local and Remote File Inclusion attacks, SQL-Injection, Password attacks, Privilege Escalation, and Port Redirection.

This item is in Standard package and Premium Package.
Either package contains training for 4 bundled packages of Apple, Cisco, CompTIA and Microsoft and about 100 other items, like TrainingCode Active Directory in Azure,Adobe Creative Cloud,Advanced PowerPoint, Amazon Web Services, Access, Excel,Google Apps for Work,Object Oriented Java etc. With premium package, however, you also will gain access to practice exams, and be able to launch premium virtual labs. A combined $358 value!


Find a class and register in three easy steps:
  • 1. Select Location:
  • 2. Select Date Range:
    to
  • 3. Select Class Type:
    • All Types
    • C Classroom
    • V Virtual Live
    • Cv In-Class Virtual
    • O Online
ITStandard <span class="course-type type-o" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'Online')" onmouseout="clearHoverInfo()">O</span>n/a570.001562015
ITPremium <span class="course-type type-o" style="cursor:default;word-wrap:normal;display:inline-block;" onmouseover="showHoverInfo(this, 'ProductTypeDescription' ,'Online')" onmouseout="clearHoverInfo()">O</span>n/a857.001562016
seek-warrow-w
  • 1
arrow-eseek-eitems per page1 - 2 of 2 items