In this course you will start as beginner without previous knowledge about penetration testing. This course will take you through complete network penetration testing where you will go through 5 stages; Information Gathering, Enumeration, Vulnerability Scanning, Exploitation and Post Exploitation.
This course is focused on practical, hands-on side of penetration testing.
Course is divided into standard pentest stages:
NOTE: Everything shown in the course is made for educational purposes only. In order to do penetration testing on network, web application, server or other device(s) you must have written permission by the owner.
We are penetration testers and ethical hackers with an extensive background in web application security, web and software development, network administration and exploit development. Over 7 years of professional experience in cyber security domain.
We found security issues in Google's products (YouTube XSS), Microsoft, Verizon, eBay, Prezi, AT&T and many others. Our instructors hold one of the most valuable certifications in cyber security domain; OSCP, LPT, C|EH, CISSP, OSCE.