Skip to main content

4 Classes

Certified Ethical Hacker Course
Hacking / Red Team Training
Preview Course

Hacking / Red Team Training

Certified Ethical Hacker Course

The Certified Ethical Hacker (CEH) is a certification program for an information security professional, also referred to as a white-hat hacker, who systematically attempts to inspect network infrastructure with the consent of its owner to find security vulnerabilities which a malicious hacker could potentially exploit. The program helps you assess the security posture of an organization by identifying vulnerabilities in the network and system infrastructure to determine if unauthorized access is possible.

Cost breakdown:
Course only: $299.99
Course with test Voucher and iLabs access: $1249.99

PayPal
Pentest+ Online Course
Hacking / Red Team Training
Preview Course

Hacking / Red Team Training

Pentest+ Online Course

What Skills Will You Learn?


PLANNING & SCOPING

Explain the importance of planning and key aspects of compliance-based assessments

INFORMATION GATHERING & VULNERABILITY IDENTIFICATION

Gather information to prepare for exploitation then perform a vulnerability scan and analyze results.

ATTACKS & EXPLOITS

Exploit network, wireless, application, and RF-based vulnerabilities, summarize physical security attacks and perform post-exploitation techniques

PENETRATION TESTING TOOLS

Conduct information gathering exercises with various tools and analyze the output and basic scripts (limited to Bash, Python, Ruby, PowerShell)

REPORTING & COMMUNICATION

Utilize report writing and handling best practices explaining recommended mitigation strategies for discovered vulnerabilities

PayPal
Cyber Range Management
Hacking / Red Team Training
Preview Course

Hacking / Red Team Training

Cyber Range Management

Pivoting and Reverse Tunneling
Hacking / Red Team Training
Preview Course

Hacking / Red Team Training

Pivoting and Reverse Tunneling

This course covers how to communicate system to system during an assessment.  One of the biggest challenges is that you found a vulnerability to exploit, but you run into a road block...  The firewall is blocking incoming connections outside the vulnerable port or you don't have a static IP address.  As ethical hackers and pen testers, we may be working out of a hotel room at night.  How can you connect to the target systems on the inside of their network?  This course explains the challenges in depth and walks through solutions to many of these common challenges.

PayPal