Ethical HackingRSS

Ethical Hacking/Pen Testing Training

 

Ethical Hacking courses are designed to teach the security professional the tools and techniques of his/her adversary, using the philosophy "it takes a thief to catch a thief" Once again this page is aimed at telling you in an unbiased way what is out there, not how good the courses are.  They don't come cheap, before choosing one research it well. If you have sufficient buying power use it to gain a free evaluation course before committing to spending a lot of money.

Commercial
Pricing Model

2-day practical penetration testing course - Build on the knowledge gained in CSTA Ethical Hacking: Hands-On, using the frameworks & tools used by professional penetration testers to: audit & compromise system security, assess weaknesses in w ...

Modified
Offensive Security
Commercial
Pricing Model

Penetration Testing with Kali (PWK) is a self-paced online pen testing course designed for network administrators and security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This unique pen ...

Modified
Penetration Testing with Kali Linux
Commercial
Pricing Model

This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the curren ...

Modified
Net-Security Training
Commercial
Pricing Model

The CREST penetration testing course takes students of varying IT experience levels and re-skills them so that they can enter the industry not as a trainee but as qualified Penetration Tester making them productive from day one. This is an Accredited CRES ...

Modified
CREST Registered Penetration Tester
Commercial
Pricing Model

In this course you will learn 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data. Ad ...

Modified
Penetration Testing Engineer
ISECOM - Institute for Security and Open Methodologies

The premise of the training course is to support the necessary knowledge transfer for a person to be considered a capable, resourceful, and self-sufficient security tester. The training course focuses on the technical skills necessary for security testing ...

ModifiedNever
Orange Cyberdefense
Commercial
Pricing Model

An introductory course for those starting the journey into penetration testing or those working in environments where understanding how hackers think and the tools, tactics and techniques they use. The course presents the background information, technical ...

Modified
Hands-on Hacking Fundamentals
InfoSec Institute
Commercial
Pricing Model

Discover vulnerabilities before cybercriminals do! Our most popular information security and hacking training goes in-depth into the techniques used by malicious actors with attention-getting lectures and hands-on labs. Earn your CEH and PenTest+, guaran ...

Modified
Ethical Hacking Dual Certification Boot Camp (CEH and PenTest+)
InfoSec Institute

In Advanced Ethical Hacking: Expert Penetration Testing, you will delve deep into the less well-known, less obvious, and consequently more difficult to master techniques that are available today to penetration testers. you will walk out the door with the ...

ModifiedNever
Commercial
Pricing Model

SEC504 helps you develop the skills to conduct incident response investigations. You will learn how to apply a dynamic incident response process to evolving cyber threats, and how to develop threat intelligence to mount effective defense strategies for cl ...

Modified
Hacker Tools, Techniques, and Incident Handling
Learning Tree International
Commercial
Pricing Model

In this CEH training course, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker (CEH v11) exam. You will learn how to deploy tools and techniques to protect your network through hands-on labs that mimic ...

Modified
Certified Ethical Hacker
Foundstone, Inc.
Commercial
Pricing Model

What Will You Learn? For the advanced security engineer, this course is the pinnacle of the Ultimate Hacking series and is a continuation of the Ultimate Hacking: Hands On course. It encompasses such topics as wireless security, SQL injection techniques, ...

Modified
WaveFront Consulting Group
Commercial
Pricing Model

"This four-day course is based on Sun Tzu's principle that knowing one's enemy will strengthen one's defenses and more adequately prepare one for battle. It is better for us to find the vulnerabilities in our systems ourselves and fix them, before th ...

Modified
Commercial
Pricing Model

SEC617 will give you the skills you need to understand the security strengths and weaknesses in wireless systems. In this course, you will learn how to evaluate the ever-present cacophony of Wi-Fi networks and identify the Wi-Fi access points and client d ...

Modified
Wireless Penetration Testing and Ethical Hacking: SEC617
Commercial
Pricing Model

SEC542 enables students to assess a web application's security posture and convincingly demonstrate the business impact should attackers exploit the discovered vulnerabilities. You will practice the art of exploiting web applications to find flaws in your ...

Modified
Web App Penetration Testing and Ethical Hacking: SEC542
Commercial
Pricing Model

You will learn the skills required to reverse-engineer applications to find vulnerabilities, perform remote user application and kernel debugging, analyze patches for one-day exploits, perform advanced fuzzing, and write complex exploits against targets s ...

Modified
Advanced Exploit Development for Penetration Testers: SEC760
Infosec Institute
Commercial
Pricing Model

 This boot camp teaches you how to use the tools and techniques used by cybercriminals to perform an ethical hack on your organization. You’ll learn ethical hacking methodologies and gain hands-on hacking experience in our cloud-hosted cyber range, i ...

Modified
Ethical Hacking Dual Certification Boot Camp
Security University
Commercial
Pricing Model

This Intense 72 hour Q/EH® Qualified/ Ethical Hacker class provides you with basic understanding of the hacking skills and tools required to determine potential security weakness in your organization. This class is your next class after Security+ and befo ...

Modified
Qualified Ethical Hacker and Q/EH Exam
Commercial
Pricing Model

In this course you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build a solid knowledge of the lowest layers of the network. In ...

Modified
EC-Council Ethical Hacking Core Skills