Penetration Testing Training: Tools and Techniques

Course 537

  • Duration: 4 days
  • Labs: Yes
  • Language: English
  • 32 (ISC)2 CPE A Credits
  • Level: Intermediate
Get This Course £2,095
  • 4-day instructor-led training course
  • One-on-one after-course instructor coaching
  • Tuition fee can be paid later by invoice -OR- at the time of checkout by credit card
#537
  • Guaranteed to Run - you can rest assured that the class will not be cancelled.
    Jul 26 - 29 2:00 PM - 9:30 PM BST
    Herndon, VA or AnyWare
  • Sep 26 - 29 9:00 AM - 4:30 PM BST
    AnyWare
  • Nov 7 - 10 2:00 PM - 9:30 PM GMT
    Washington, DC or AnyWare
  • Dec 19 - 22 9:00 AM - 4:30 PM GMT
    AnyWare
  • Jan 24 - 27 2:00 PM - 9:30 PM GMT
    Herndon, VA or AnyWare
  • Mar 20 - 23 9:00 AM - 4:30 PM GMT
    London or AnyWare
  • Mar 28 - 31 2:00 PM - 9:30 PM BST
    New York or AnyWare
  • May 9 - 12 2:00 PM - 9:30 PM BST
    Washington, DC or AnyWare
  • Jun 26 - 29 9:00 AM - 4:30 PM BST
    AnyWare

Scroll to view additional course dates

In this Penetration Testing training course you learn how hackers compromise operating systems and evade antivirus software. You will learn to discover weaknesses in your own network by using the same mindset and methods as hackers. You then acquire the skills to test and exploit your defences and implement countermeasures to reduce risk in your enterprise.

  • Experience with security issues at the level of:
    • Course 468, System and Network Security Introduction, or
    • Course 446 CompTIA Security+ Certification Exam Preparation

  • Knowledge in TCP/IP concepts

Penetration Testing Training: Tools and Techniques Delivery Methods

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

Penetration Testing Training: Tools and Techniques Course Benefits

  • Deploy ethical hacking to expose weaknesses in your organisation
  • Gather intelligence by employing reconnaissance, published data, and scanning tools
  • Test and improve your security by compromising your network using hacking tools
  • Protect against privilege escalation to prevent intrusions

Penetration Testing Course Outline

  • Defining a penetration testing methodology
  • Creating a security testing plan

Acquiring target information

  • Locating useful and relevant information
  • Scavenging published data
  • Mining archive sites

Scanning and enumerating resources

  • Identifying authentication methods
  • Harvesting e–mail information
  • Interrogating network services
  • Scanning from the inside out with HTML and egress busting

Correlating weaknesses and exploits

  • Researching databases
  • Determining target configuration
  • Evaluating vulnerability assessment tools

Leveraging opportunities for attack

  • Discovering exploit resources
  • Attacking with Metasploit

Bypassing router Access Control Lists (ACLs)

  • Discovering filtered ports
  • Manipulating ports to gain access
  • Connecting to blocked services

Compromising operating systems

  • Examining Windows protection modes
  • Analysing Linux/UNIX processes

Subverting web applications

  • Injecting SQL and HTML code
  • Hijacking web sessions by prediction and Cross–Site Scripting (XSS)
  • Bypassing authentication mechanisms

Baiting and snaring inside users

  • Executing client–side attacks
  • Gaining control of browsers

Manipulating internal clients

  • Harvesting client information
  • Enumerating internal data

Deploying the social engineering toolkit

  • Cloning a legitimate site
  • Diverting clients by poisoning DNS

Initiating remote shells

  • Selecting reverse or bind shells
  • Leveraging the Metasploit Meterpreter

Pivoting and island–hopping

  • Deploying portable media attacks
  • Routing through compromised clients

Pilfering target information

  • Stealing password hashes
  • Extracting infrastructure routing, DNS and NetBIOS data

Uploading and executing payloads

  • Controlling memory processes
  • Utilising the remote file system

Masquerading network traffic

  • Obfuscating vectors and payloads
  • Side–stepping perimeter defences

Evading antivirus systems

  • Discovering stealth techniques to inject malware
  • Uncovering the gaps in antivirus protection
  • Reporting results and creating an action plan
  • Managing patches and configuration
  • Recommending cyber security countermeasures

Need Help Finding The Right Training Solution?

Our training advisors are here for you.

Course FAQs

Penetration testing tests a computer system, network or web app to make sure there are not any vulnerabilities that a potential attacker could use.

Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.