Penetration Testing
Penetration Tester program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, Pentest live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.
The heart of the Penetration Testing program is all about helping you master your pen testing skills by putting them to use on our live cyber ranges. The course ranges were designed to be dynamic in order to give you a real-world training program, so just as targets and technology continue to change in live networks, both the Pentest practice and exam ranges will mimic this reality as our team of engineers continue to add targets and defenses throughout the course’s lifetime.
Course Module
Module 01: Introduction
Module 02: In-Depth Scanning
Module 03: Exploitation
Module 04: Command Line Fun
Module 05: Getting Comfortable with Kali Linux
Module 06: Bash Scripting
Module 07: Practical Tools
Module 08: Active Information Gathering
Module 09: Passive Information Gathering
Module 10: Introduction to Buffer Overflows
Module 11: Buffer Overflows
Module 12: Fixing Exploits
Module 13: Locating Public Exploits
Module 14: Antivirus Evasion
Module 15: File Transfers
Module 16: Windows Privilege Escalation
Module 17: Linux Privilege Escalation
Module 18: Password Attacks
Module 19: Port Redirection and Tunneling
Module 20: Active Directory Attacks
Module 21: Power Shell Empire
Module 22: Trying Harder: The Labs
Module 23: Penetration Test Breakdown