×
Phoenix TS

Hands-On Hacking Training

Develop your ethical hacking skills with this action-based learning training that is 100% hands-on hacking practice with guidance from expert instructors.

Course Overview

This 4-day training course allows students to practice using the tools and tricks that make an ethical hacker great. This course is 100% hacking. Our expert instructor will be present to guide your experience and answer your questions, but your time will be spent with your fingers on a keyboard.

Schedule

Hands-On Hacking Training

date
location
price
5/16/23 - 5/19/23 (4 days)

8:30AM - 4:30PM

Tysons Corner, VA
Open
$2,195
5/23/23 - 5/26/23 (4 days)

8:30AM - 4:30PM

Online
Open
$2,195
5/23/23 - 5/26/23 (4 days)

8:30AM - 4:30PM

Columbia, MD
Open
$2,195
7/11/23 - 7/14/23 (4 days)

8:30AM - 4:30PM

Tysons Corner, VA
Open
$2,195
7/18/23 - 7/21/23 (4 days)

8:30AM - 4:30PM

Online
Open
$2,195
7/18/23 - 7/21/23 (4 days)

8:30AM - 4:30PM

Columbia, MD
Open
$2,195
9/05/23 - 9/08/23 (4 days)

8:30AM - 4:30PM

Tysons Corner, VA
Open
$2,195
9/12/23 - 9/15/23 (4 days)

8:30AM - 4:30PM

Online
Open
$2,195
9/12/23 - 9/15/23 (4 days)

8:30AM - 4:30PM

Columbia, MD
Open
$2,195
12/05/23 - 12/08/23 (4 days)

8:30AM - 4:30PM

Tysons Corner, VA
Open
$2,195
12/12/23 - 12/15/23 (4 days)

8:30AM - 4:30PM

Online
Open
$2,195
12/12/23 - 12/15/23 (4 days)

8:30AM - 4:30PM

Columbia, MD
Open
$2,195
[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Outline

Module 1: Introduction to Penetration Testing

Module 2: Penetration Testing Scoping and Engagement

Module 3: Open Source Intelligence (OSINT)

Module 4: Social Engineering Penetration Testing

Module 5: Network Penetration Testing – External

Module 6: Network Penetration Testing– Internal

Module 7: Network Penetration Testing – Perimeter Devices

Module 8: Web Application Penetration Testing

Module 9: Wireless Penetration Testing

Module 10: IoT Penetration Testing

Module 11: OT/SCADA Penetration Testing

Module 12: Cloud Penetration Testing

Module 13: Binary Analysis and Exploitation

Module 14: Report Writing and Post Testing Actions

FAQs

Who should take this course?
  • Ethical Hackers
  • Penetration Testers
  • Network server administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators and Risk Assessment professionals
What should you expect to learn in this course?
  • Advanced Windows Attacks
  • Attacking IoT Systems
  • Writing Exploits: Advanced Binary Exploitation
  • Bypassing a Filtered Network
  • Pen testing Operational Technology (OT)
  • Access Hidden Networks with Pivoting
  • Double Pivoting
  • Privilege Escalation
  • Evading Defense Mechanisms
  • Attack Automation with Scripts
  • Weaponize Your Exploits
  • Write Professional Reports 
Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name(Required)