Intro to Penetration Testing Training (PT01)
Cost
Continuing Education Credits
Duration
Formats Available


Job Target
Penetration Testers
Ethical Hackers
Includes
- Expert Trainers with Real-World Experience
- Available Live Online or Live In-Person
- Outstanding Reviews
Description
This hands-on penetration testing course focuses on tactics, techniques, and procedures used by both black hat attackers and penetration testers (white hat hackers). The course starts with an overview of hacking incidents, trends, and attacker motivations. The course progresses to penetration testing methodologies. These often overly complicated methodologies, filled with an excessive number of steps, are simplified in this course with an emphasis on the penetration test objective. Each hacking phase of the simplified methodology is demonstrated, discussed, and practiced. Attendees practice penetration testing in a fun and interactive environment with multiple live targets and CTF (Capture the Flag) exercises.
The Intro to Penetration Testing (Ethical Hacking) course is an excellent introduction to penetration testing. Emphasis is placed on learning, demonstrating, and practicing the primary tactics – reconnaissance (active and passive), vulnerability discovery and identification, exploitation, and persistence. Numerous methods are covered to include server-side exploits, client-side exploits, man-in-the-middle (MITM), and social engineering.
- Hacking Trends and Motivations
- Hacking Methodology
- Reconnaissance
- Vulnerability Identification
- Initial Exploitation
- Expanding Foothold
- Persistence
General knowledge of computer, networking, and operating system fundamentals. Some exposure to Kali linux recommended.
TOPICS COVERED
- Cyber Terrorists
- OPM Breach
- Hacking Methodology
- Passive Reconnaissance
- OSINT
- Active Reconnaissance
- Vulnerability Research
- Expanding Foothold
- Persistence
- Social Media
- Whois
- robots.txt
- Social Engineering
- Phishing
- Nmap
- ICMP
- Metasploit
- Armitage
- Exploitation
- Payloads
- Vulnerability Types
- CVSS
- exploit-db.com
- Forward vs Reverse Shells
- Meterpreter
- Man-In-The-Middle (MITM)
- ARP
- arpspoof
- Ettercap
- Computer Incidents
- Attack Discovery
- Attack Sophistication
- Intruder Knowledge
- Attacker Motivations
- White Hat Hackers
- Black Hat Hackers
- Script Kiddies
- Hacktivists
- State Sponsored Hackers
- Spy Hackers
- DNS
- Netcraft
- Google Hacking – GHDB
- Shodan
- Cogmap
- Port Scanning
- TCP
- UDP
- IP
- hping3
- Banner Grabbing
- CVE
- Nessus
- OpenVAS
- Infectious Media
- Client-Side Attacks
- Browser Attacks
- Credential Harvesting
- Social-Engineering Toolkit (SET)
- Pivoting
- Zero Day (0-day) Exploits
- Offline Password Cracking
- Online Password Cracking
- driftnet
- Privilege Escalation
- John the Ripper
- THC-Hydra
- Hashing