Subscribe to the RSS Feed

Subscribe to the RSS Feed

Hands-on Network Penetration Testing and Ethical Hacking


Early Bird Registration: $975 USD (Ends May 1st, 2018)
Standard Registration: $1250 (Ends May 18th, 2018)
On-site Registration: $1600 USD

Training Registration

Head over to the Registration page for more details or click below to register directly via Universe:


Get Tickets

Overview

This hands-on focused course is designed to get you started with penetration testing with guidance from a full-time penetration tester with 20+ years of technical experience. Covering the phases of exploitation, real-world attack strategies, effective use of Metasploit, and privilege escalation techniques. This course is a “must have” for anyone who is ready to jump start their career in penetration testing. Each student will receive a take home exploitation lab with 10 vulnerable targets to practice on, printed materials, cheatsheets, compiled exploits, and walkthroughs for each target.

Topics covered in this training:

  • Penetration testing Methodologies
  • Exploitation Lifecycle
  • Time Management for Penetration Testers
  • Network Communication for Attackers (Shells, Callbacks)
  • Network Reconnaissance Tools & Techniques
  • Host and Service Enumeration
  • Common Enterprise Vulnerabilities and Exploits
  • Service Exploitation
  • Metasploit and Meterpreter Usage
  • Exploit/Callback Handling and Management
  • Exploit Development and Modification
  • Hands-on System and Network Exploitation Lab

Who Should Take This Course?

This course is intended for penetration testers, security analysts, security administrators, network administrators with a security focus, and anyone else interested in learning about offensive reconnaissance and exploitation techniques used by red teams and black hats. This course focuses on the fundamentals of penetration testing and ethical hacking as is appropriate for beginner to intermediate skill levels.

Student Requirements

Students should have a basic understanding of IP networking and the Linux and Windows command-line. Students must bring a 64bit system capable of booting from an external USB drive and a working Ethernet port supported by Kali Linux.

What Will Students Be Provided With?

Each student will receive a take home exploitation lab with 10 vulnerable targets to practice on, a video of the class, and walkthroughs for each target. Covering the phases of exploitation, real-world attack strategies, effective use of Metasploit, and privilege escalation techniques.

Trainers

Geoffrey Janjua The founder of Exumbra Operations Group, a former US DoD civilian with 12+ years of practical, operational field experience conducting offensive operations. Specializing in computer exploitation, technical operations, and covert-entry, he is currently conducting full-scope penetration testing, vulnerability research and exploit development of high-value products for a Fortune 200 company. He presented “Kerberos Party Tricks: Weaponizing Kerberos Protocol Flaws” at LayerOne 2016 and holds many industry certifications including OSCP, GPEN, CEPT, CPT, ECSA, CEH, and CRT.

Return to the Trainings page.

(^Top)