Penetration Testing and Exploitation

Knowing how to think like the enemy is a massive advantage when trying to defend against or track them down.  This course focuses on the offensive side of security while preparing you for the CSI Linux Penetration Testing and Exploitation, EC-Council Certified Ethical Hacker (CEHv11), and CompTIA's Pentest+ certifications.  By the end of the training, you will have learned the base process of conducting a penetration test risk assessment to identify and take advantage of weaknesses and vulnerabilities.  You will also have access to a large test back to help you prepare for the three certifications listed above.

Pivoting and Tunneling Traffic

This course covers how to communicate system to system during an assessment.  One of the biggest challenges is that you found a vulnerability to exploit, but you run into a road block...  The firewall is blocking incoming connections outside the vulnerable port or you don't have a static IP address.  As ethical hackers and pen testers, we may be working out of a hotel room at night.  How can you connect to the target systems on the inside of their network?  This course explains the challenges in depth and walks through solutions to many of these common challenges.