Course Description
Ethical Hacking and Penetration Testing 4-Day Course
Vulnerability scanning and security audits alone will not ensure the security of an organization because they only test for currently known vulnerabilities with little to no analysis of how these vulnerabilities may be exploited. To ensure that systems are adequately protected, administrators must probe networks and assess the security posture for vulnerabilities and exposed surfaces while attempting to exploit them. Penetration testing fills a vital organizational need by confirming information security policies are both adequate and sufficiently implemented to protect against novel attacks.
The 4-day Ethical Hacking & Penetration Testing course provides students with intermediate level training in hacking and penetration testing techniques. The training immerses each student into a hand-on interactive environment where they will learn how to scan and attack with the purpose of securing networks and information systems. The training course is led by an experienced instructor and provides students practical exercises in the skills needed to test and protect today’s sensitive networks and information systems. The course includes a combination of lecture and demonstrations designed around a virtual lab environment. Labs cover various scenarios that provide for robust and realistic hands-on experiences across a range of topic areas. Students will begin by understanding the five phases of hacking and will then be introduced to various tools and methods for conducting “white hat” system/ network penetration testing. Through exposure to the types of methodologies and tools used by hackers, students obtain the skills needed to provide evidence of weaknesses and real assurance that current controls are working properly.
The students will obtain the ability to quantitatively assess and measure threats to information assets and discover where an organization is most vulnerable to hacking. In addition, students will receive in-depth instruction on the ethics of hacking and penetration testing as well as how to develop appropriate rules of engagement. The goal of this course is to help the student master a repeatable, documentable penetration testing methodology that can be used in an ethical penetration testing or “white hat” hacking situation.
Course includes the following takeaway items: a printed training book and a CD that includes reference materials pertaining to the course.
NICE Work Roles
Exploitation Analyst
Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.
Secure Software Assessor
Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.
Course Modules
- Module 1 - Introduction to “White Hat” Hacking & Penetration Testing
- Module 2 – Reconnaissance and Social Engineering
- Module 3 – Scanning and Footprinting
- Module 4 – Getting Access
- Module 5 – Types of Attacks
- Module 6 – Maintaining Access
- Module 7 – Covering Tracks
- Module 8 – Using the Results of “White Hat” Hacking
- Module 9 – CAPSTONE Exercise
Need more information on this course?
Course Overview
Related Courses
Course Testimonials
“It has been a great experience learning RMF by the way of the instructor, Ashely Roan who was very knowledgeable in the field. Thank you for making the course enjoyable, relatable and memorable!”
Ashanta Gamble
“Instruction was first rate. Lunarline worked with my organization in a flexible manner allowing me to obtain the training as required. I enjoyed the instructor- knowledgeable, personable, professional, entertaining and impressive.”
Kevin Shaffer
“Excellent learning experience. Many classes taken over my career, this class offered a “real” world approach to a new methodology. Easy to follow, repetitious in the right areas. Excellent coverage of material at appropriate pace. Real world example were good!”
Deedie Weaver
“The class was excellent! I will continue to take classes from Lunarline in the future. The course material being loaded on a tablet was also a great idea because this will be a great resource to have in my future meetings.”
Nakia Jackson