Subscribe to the RSS Feed

Subscribe to the RSS Feed

Penetration Testing for Large Organizations


Early Bird Registration: $975 USD (Ends May 1st, 2019)
Standard Registration: $1250 (Ends May 18th, 2019)
On-site Registration: $1600 USD

Training Registration

Head over to the Registration page for more details or click below to register directly via Universe:



Get Tickets

Overview

This hands-on focused course is designed to get you started with penetration testing with guidance from a full-time penetration tester with 15+ years of technical experience. Covering the phases of exploitation, real-world attack strategies, effective use of Metasploit, and privilege escalation techniques. This course is a “must have” for anyone who is ready to jump start their career in penetration testing. Each student will receive a take home exploitation lab with 10 vulnerable targets to practice on, printed materials, cheatsheets, compiled exploits, and walkthroughs for each target.

Topics covered in this training:

  • Penetration testing Methodologies
  • Exploitation Lifecycle
  • Time Management for Penetration Testers
  • Network Communication for Attackers (Shells, Callbacks)
  • Network Reconnaissance Tools & Techniques
  • Host and Service Enumeration
  • Common Enterprise Vulnerabilities and Exploits
  • Service Exploitation
  • Metasploit and Meterpreter Usage
  • Exploit/Callback Handling and Management
  • Exploit Development and Modification
  • Hands-on System and Network Exploitation Lab

Who Should Take This Course?

This course is intended for penetration testers, security analysts, security administrators, network administrators with a security focus, and anyone else interested in learning about offensive reconnaissance and exploitation techniques used by red teams and black hats. This course focuses on the fundamentals of penetration testing and ethical hacking as is appropriate for beginner to intermediate skill levels.

Student Requirements

Students should have a basic understanding of IP networking and the Linux and Windows command-line. Students must bring a 64bit system capable of booting from an external USB drive and a working Ethernet port supported by Kali Linux.

What Will Students Be Provided With?

Each student will receive a take home exploitation lab with 10 vulnerable targets to practice on, a video of the class, and walkthroughs for each target. Covering the phases of exploitation, real-world attack strategies, effective use of Metasploit, and privilege escalation techniques.

Trainers

datagram is a hacker with over 15 years of experience with penetration testing, exploit development, reverse engineering, and physical security. He has taught at many conferences around the world on a variety of security topics. Data runs the LayerOne conference and is one of the founding members of Null Space Labs hackerspace in Burbank, CA.

Return to the Trainings page.

(^Top)