Intro to Penetration Testing (Ethical Hacking) (PT01)
"The instructor was extremely knowledgeable and crafted the exercises and discussions so we truly learned the material. I have a new appreciation for how systems are exploited."
This hands-on penetration testing course focuses on tactics, techniques, and procedures used by both black hat attackers and penetration testers (white hat hackers). The course starts with an overview of hacking incidents, trends, and attacker motivations. The course progresses to penetration testing methodologies. These often overly complicated methodologies, filled with an excessive number of steps, are simplified in this course with an emphasis on the penetration test objective. Each hacking phase of the simplified methodology is demonstrated, discussed, and practiced. Attendees practice penetration testing in a fun and interactive environment with multiple live targets and CTF (Capture the Flag) exercises.
The Intro to Penetration Testing (Ethical Hacking) course is an excellent introduction to penetration testing. Emphasis is placed on learning, demonstrating, and practicing the primary tactics - reconnaissance (active and passive), vulnerability discovery and identification, exploitation, and persistence. Numerous methods are covered to include server-side exploits, client-side exploits, man-in-the-middle (MITM), and social engineering.
General knowledge of computer, networking, and operating system fundamentals. Some exposure to Kali linux recommended.
Hacking Trends and Motivations
Forward vs Reverse Shells
White Hat Hackers
Black Hat Hackers
State Sponsored Hackers
Google Hacking - GHDB
Social-Engineering Toolkit (SET)
Zero Day (0-day) Exploits
Offline Password Cracking
Online Password Cracking
John the Ripper
Continuing Education Credits
Our Intro to Penetration Testing training is offered less than 15 minutes from downtown St. Louis, near Scott Air Force Base, at our O'Fallon, Illinois training facility, located at:
7 Eagle Center, Suite B-5
O'Fallon, IL 62269
Live, Instructor-Led Training with a dynamic trainer that is a cybersecurity professional. Instructors have real-world penetration testing experience with the tactics and techniques covered in the course.