×
Phoenix TS

Hands-On Hacking Training

Develop your ethical hacking skills with this action-based learning training that is 100% hands-on hacking practice with guidance from expert instructors.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Course Overview

This 4-day training course allows students to practice using the tools and tricks that make an ethical hacker great. This course is 100% hacking. Our expert instructor will be present to guide your experience and answer your questions, but your time will be spent with your fingers on a keyboard.

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.

[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Outline

Module 1: Introduction to Penetration Testing

Module 2: Penetration Testing Scoping and Engagement

Module 3: Open Source Intelligence (OSINT)

Module 4: Social Engineering Penetration Testing

Module 5: Network Penetration Testing – External

Module 6: Network Penetration Testing– Internal

Module 7: Network Penetration Testing – Perimeter Devices

Module 8: Web Application Penetration Testing

Module 9: Wireless Penetration Testing

Module 10: IoT Penetration Testing

Module 11: OT/SCADA Penetration Testing

Module 12: Cloud Penetration Testing

Module 13: Binary Analysis and Exploitation

Module 14: Report Writing and Post Testing Actions

FAQs

Who should take this course?
  • Ethical Hackers
  • Penetration Testers
  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment professionals
What should you expect to learn in this course?
  • Advanced Windows Attacks
  • Attacking IoT Systems
  • Writing Exploits: Advanced Binary Exploitation
  • Bypassing a Filtered Network
  • Pen testing Operational Technology (OT)
  • Access Hidden Networks with Pivoting
  • Double Pivoting
  • Privilege Escalation
  • Evading Defense Mechanisms
  • Attack Automation with Scripts
  • Weaponize Your Exploits
  • Write Professional Reports 

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name(Required)