Course Overview
This 4-day training course allows students to practice using the tools and tricks that make an ethical hacker great. This course is 100% hacking. Our expert instructor will be present to guide your experience and answer your questions, but your time will be spent with your fingers on a keyboard.
Schedule
Hands-On Hacking Training
date
location
price
![[image]](https://phoenixts.com/wp-content/themes/phoenixts-com/assets/images/temp/image-9@2x.jpg)
Not seeing a good fit?
Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.
Learn more about custom training
Course Outline
Module 1: Introduction to Penetration Testing
Module 2: Penetration Testing Scoping and Engagement
Module 3: Open Source Intelligence (OSINT)
Module 4: Social Engineering Penetration Testing
Module 5: Network Penetration Testing – External
Module 6: Network Penetration Testing– Internal
Module 7: Network Penetration Testing – Perimeter Devices
Module 8: Web Application Penetration Testing
Module 9: Wireless Penetration Testing
Module 10: IoT Penetration Testing
Module 11: OT/SCADA Penetration Testing
Module 12: Cloud Penetration Testing
Module 13: Binary Analysis and Exploitation
Module 14: Report Writing and Post Testing Actions
FAQs
- Ethical Hackers
- Penetration Testers
- Network server administrators
- Firewall Administrators
- Security Testers
- System Administrators and Risk Assessment professionals
- Advanced Windows Attacks
- Attacking IoT Systems
- Writing Exploits: Advanced Binary Exploitation
- Bypassing a Filtered Network
- Pen testing Operational Technology (OT)
- Access Hidden Networks with Pivoting
- Double Pivoting
- Privilege Escalation
- Evading Defense Mechanisms
- Attack Automation with Scripts
- Weaponize Your Exploits
- Write Professional Reports