Intro to Penetration Testing (Ethical Hacking)(PT01)

"The instructor was extremely knowledgeable and crafted the exercises and discussions so we truly learned the material. I have a new appreciation for how systems are exploited."

This hands-on course focuses on tactics, techniques, and procedures used by both black hat attackers and penetration testers (white hat hackers). The course starts with an overview of hacking incidents, trends, and attacker motivations. The course progresses to penetration testing methodologies. These often overly complicated methodologies, filled with an excessive number of steps, are simplified in this course with an emphasis on the penetration test objective.  Each hacking phase of the simplified methodology is demonstrated, discussed, and practiced. Attendees practice penetration testing in a fun and interactive environment with multiple live targets and CTF (Capture the Flag) exercises.

Course was excellent. I highly recommend to anyone getting into the offensive security field.
— DoD Penetration Tester

The Intro to Penetration Testing (Ethical Hacking) course is an excellent introduction to penetration testing.  Emphasis is placed on learning, demonstrating, and practicing the primary tactics - reconnaissance (active and passive), vulnerability discovery and identification, exploitation, and persistence.  Numerous methods are covered to include server-side exploits, client-side exploits, man-in-the-middle (MITM), and social engineering.

Prerequisites

General knowledge of computer, networking, and operating system fundamentals. Some exposure to Kali linux recommended.

OVERVIEW

Great labs showing use of Kali tools for exploitation. Course delivered at a good pace with great examples!
— Senior Network Analyst, Edward Jones
  • Hacking Trends and Motivations
  • Hacking Methodology
  • Reconnaissance
  • Vulnerability Identification
  • Initial Exploitation
  • Expanding Foothold
  • Persistence

Topics Covered

  • Cyber Terrorists
  • OPM Breach
  • Hacking Methodology
  • Passive Reconnaissance
  • OSINT
  • Active Reconnaissance
  • Vulnerability Research
  • Expanding Foothold
  • Persistence
  • Social Media
  • Whois
  • robots.txt
  • Social Engineering
  • Phishing
  • Nmap
  • ICMP
  • Metasploit
  • Armitage
  • Exploitation
  • Payloads
  • Vulnerability Types
  • CVSS
  • exploit-db.com
  • Forward vs Reverse Shells
  • Meterpreter
  • Man-In-The-Middle (MITM)
  • ARP
  • arpspoof
  • Ettercap
  • driftnet
  • Privilege Escalation
  • John the Ripper
  • THC-Hydra
  • Hashing
  • Computer Incidents
  • Attack Discovery
  • Attack Sophistication
  • Intruder Knowledge
  • Attacker Motivations
  • White Hat Hackers
  • Black Hat Hackers
  • Script Kiddies
  • Hacktivists
  • State Sponsored Hackers
  • Spy Hackers
  • DNS
  • Netcraft
  • Google Hacking - GHDB
  • Shodan
  • Cogmap
  • Port Scanning
  • TCP
  • UDP
  • IP
  • hping3
  • Banner Grabbing
  • CVE
  • Nessus
  • OpenVAS
  • Infectious Media
  • Client-Side Attacks
  • Browser Attacks
  • Credential Harvesting
  • Social-Engineering Toolkit (SET)
  • Pivoting
  • Zero Day (0-day) Exploits
  • Offline Password Cracking
  • Online Password Cracking

SOFTWARE AND TOOLS USED

alpine-security-ethical-hacking-st-louis.jpg
  • Kali Linux
  • Wireshark
  • VMware
  • Nessus

Course Duration

3 days

Continuing Education Credits

21

Locations

 
  • Selsius™ Corporate and Career Training, Southwestern Illinois College (SWIC) Belleville Campus:
    • Information Sciences Building, 2500 Carlyle Avenue, Belleville, IL 62221
  • Onsite, at your location. We love to travel and will gladly send a trainer to your location. Please Contact Us for more information.

FORMAT

Live, Instructor-Led Training with a dynamic trainer that is a cyber security professional. Instructors have real-world penetration testing experience with the tactics and techniques covered in the course.

SCHEDULE

  • May 15-17 (M-W), 8:30am - 4:30pm, 2017

DISCOUNTS

We offer course discounts for multiple enrollments.  Please Contact Us for more information.

Register

RESOURCES

RELATED COURSES

It gave me a good foundation of the skills needed in order to successfully be a pen tester.
— Intern, DHS