Penetration Testing

Penetration Tester program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, Pentest live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.

The heart of the Penetration Testing program is all about helping you master your pen testing skills by putting them to use on our live cyber ranges. The course ranges were designed to be dynamic in order to give you a real-world training program, so just as targets and technology continue to change in live networks, both the Pentest practice and exam ranges will mimic this reality as our team of engineers continue to add targets and defenses throughout the  course’s lifetime.

Course Module

Module 01: Introduction

Module 02: In-Depth Scanning

Module 03: Exploitation

Module 04: Command Line Fun

Module 05: Getting Comfortable with Kali Linux

Module 06: Bash Scripting

Module 07: Practical Tools

Module 08: Active Information Gathering

Module 09: Passive Information Gathering

Module 10: Introduction to Buffer Overflows

Module 11: Buffer Overflows

Module 12: Fixing Exploits

Module 13: Locating Public Exploits

Module 14: Antivirus Evasion

Module 15: File Transfers

Module 16: Windows Privilege Escalation

Module 17: Linux Privilege Escalation

Module 18: Password Attacks

Module 19: Port Redirection and Tunneling

Module 20: Active Directory Attacks

Module 21: Power Shell Empire

Module 22: Trying Harder: The Labs

Module 23: Penetration Test Breakdown