Ethical HackingRSS

Ethical Hacking/Pen Testing Training

 

Ethical Hacking courses are designed to teach the security professional the tools and techniques of his/her adversary, using the philosophy "it takes a thief to catch a thief" Once again this page is aimed at telling you in an unbiased way what is out there, not how good the courses are.  They don't come cheap, before choosing one research it well. If you have sufficient buying power use it to gain a free evaluation course before committing to spending a lot of money.

Foundstone, Inc.
Commercial
Pricing Model

What Will You Learn? For the advanced security engineer, this course is the pinnacle of the Ultimate Hacking series and is a continuation of the Ultimate Hacking: Hands On course. It encompasses such topics as wireless security, SQL injection techniques, ...

Modified
WaveFront Consulting Group
Commercial
Pricing Model

"This four-day course is based on Sun Tzu's principle that knowing one's enemy will strengthen one's defenses and more adequately prepare one for battle. It is better for us to find the vulnerabilities in our systems ourselves and fix them, before th ...

Modified
Commercial
Pricing Model

Security vulnerabilities, such as weak configurations, unpatched systems, and botched architectures, continue to plague organizations. Enterprises need people who can find these flaws in a professional manner to help eradicate them from our infrastructure ...

Modified
Commercial
Pricing Model

To be a wireless security expert, you need to have a comprehensive understanding of the technology, the threats, the exploits, and the defense techniques along with hands-on experience in evaluating and attacking wireless networks. This course takes an in ...

Modified
Commercial
Pricing Model

eb applications are a major point of vulnerability in organizations today. Web app holes have resulted in the theft of millions of credit cards, major financial and reputational damage for hundreds of enterprises, and even the compromise of thousands of b ...

Modified
Commercial
Pricing Model

As zero-day vulnerabilities are discovered more frequently, malicious computer attackers are constantly writing exploits to attack them. But when a new flaw is discovered, it is often difficult to determine whether it is truly exploitable, making an analy ...

Modified
Intense School
Commercial
Pricing Model

Intense School's Authorized EC Council CEH V.6 (Professional Hacking) Boot Camp brings together the hacker's mind and a professional security testing methodology. This course teaches you how to perform valid security tests requires proper training and exp ...

ModifiedNever
Security University
Commercial
Pricing Model

If you want to stop hackers, you have to get into their minds and think like them. Security University we’ll teach you more than just how a hacker thinks - you’ll learn how to scan, test, hack and secure systems, plus penetrate and attack l ...

ModifiedNever
Commercial
Pricing Model

EC-Council Certified Security Analyst (ECSA) complements the Certified Ethical Hacker (CEH) certification by exploring the analytical phase of ethical hacking. While CEH exposes the learner to hacking tools and technologies, ECSA takes it a step further b ...

Modified
EC-Council Certified Security Analyst
Commercial
Pricing Model

Certified Penetration Testing Engineer graduates will obtain real world security knowledge enabling them to recognize vulnerabilities, exploit system weaknesses, and safeguard organizations against threats. Graduates will learn the art of Ethical Hacking ...

ModifiedNever
Commercial
Pricing Model

TigerScheme is a top accreditation for security professionals who either want an entry level qualification in Penetration Testing, or take the TigerScheme qualifications granted CESG CHECK equivalence.  TigerScheme Associate Security Tester (AST) The TI ...

Modified

TigerScheme is a top accreditation for security professionals who either want an entry level qualification in Penetration Testing, or take the TigerScheme qualifications granted CESG CHECK equivalence Qualified Security Tester (QSTM) exam, candidates wil ...

Modified

In this industry standard training on penetration testing, students will learn step-by-step procedures for executing Internet, intranet, and host-level attacks. Tranchulas Hands-on Penetration Testing is the definitive training regimen for developing coun ...

ModifiedNever
Encription Limited

The Cyber Scheme CSTM course is suitable for both public and private sector IT Security professionals who wish to develop their penetration testing skills to a standard undergoing accreditation by CESG for CHECK Team Members. Covering a broad range of dis ...

Modified
The Cyber Scheme Team Member Training (CSTM)
Offensive Security

The Offensive Security Wireless Professional (OSWP) is the only practical wireless attacks certification in the security field today. The OSWP challenges the students to prove they have the practical ability to perform 802.11 wireless audits using open so ...

Modified
Offensive Security

The Offensive Security Certified Expert (OSCE) is an extremely challenging exam wherein students are required to demonstrate that they comprehend not only the material directly covered in the CTP course, but that they also fully grasp the concepts present ...

Modified
Offensive Security
Commercial
Pricing Model

The Offensive Security Exploitation Expert (OSEE) is the companion certification to the extremely demanding Advanced Windows Exploitation (AWE) course. The OSEE certification thoroughly assesses not only the students understanding of the course content, b ...

Modified
Offensive Security

The Offensive Security Web Expert (OSWE) is an entirely hands-on web application penetration testing security certification. The OSWE challenges the students to prove they have a clear and practical understanding of the web application assessment and hack ...

Modified
SecurityTube
Commercial
Pricing Model

The SecurityTube Python Scripting Expert, or SPSE, is an online certification which will help you gain mastery over Python scripting and it's application to problems in computer and network security. This course is ideal for penetration testings, security ...

Modified
SecurityTube Python Scripting Expert
SecurityTube
Commercial
Pricing Model

The SecurityTube Metasploit Framework Expert, or SMFE,  is an online certification on the Metasploit Framework. This course is ideal for penetration testers, security enthusiasts and network administrators. The course leading to the certification exa ...

Modified
SecurityTube Metasploit Framework Expert

© Computer Network Defence Limited 2021