Gain essential skills in ethical hacking. Prepare for PEN-200 with foundational security concepts and hands-on labs.
Windows Basics
Networking Fundamentals
Cryptography
Web Applications
No upcoming dates. Please check back later.
General Introduction to PEN-100
How to Learn
Introduction to Security Concepts
Practical Help Getting Started
Introduction to Linux
Command Line Basics
Manuals and Help
The Linux File System
Linux File Management
Piping and Redirection
Searching and Text Manipulation
Users and Groups
File Permissions
Linux Processes
File and Command Monitoring
Linux Applications
Scheduled Tasks
Logs
Disk Management
Linux Basics Cumulative Exercise
Linux vs. Windows
Windows Shells
Windows File System Navigation
System Information and Environment Variables
Managing Files from the Command Line
Searching for Files and Text
Windows Access Controls and Security Principles
Windows Local Accounts & Groups
Windows Permissions
Windows Processes
Windows Libraries
The Windows Registry
Windows Scheduled Tasks
Windows Disk Utilities
Windows Basics I & II - Cumulative Exercise
The OSI Model
The TCP/IP Model
Network Protocols
Data Packets and Analysis - I
Data Packets and Analysis - II
TCP/IP Helper Protocols
Useful Network Technologies
Scripting with Bash - I
Scripting with Bash - II
Scripting with Python - I
Scripting with Python - II
Scripting with Python - III
PowerShell Basics - I
PowerShell Basics - II
Essential Networking Utilities
Active Connections and Neighbors
Routing and Network Troubleshooting
Name Resolution
Common Clients
Netcat
Socat
HTTP
DNS
FTP
ACLs Overview and Netfilter Introduction
IPTables (Parameters, Modifying Rules with -A/-D/-I)
IPTables (Extended Rules and Default Policies)
UFW and FWBuilder
Managing Network Services
SSH
HTTP
FTP (pure-ftpd)
Linux Networking Practical
Essential Network Utilities
Common Clients
Firewalls
Services
Windows Networking - Cumulative Exercise
Cryptography Jargon
Encoding Part I
Encoding Part II
Hashing
Password Security
Symmetric-Key Encryption
Asymmetric-Key Encryption
The OWASP Top Ten
HyperText Transfer Protocol
HTTP Proxying and Burp Suite
HTTP Methods and Responses
HTTP Headers
Browser Development Tools, HTML, and CSS
Introduction to Javascript
HTTP Routing
Introduction to Databases and SQL
Writing a Client Program with Python - I
Writing a Client Program with Python - II
Writing a Server Program with Python
Writing a Port Scanner with Python
Website Interaction with Python - I
Website Interaction with Python - II
Capturing and Sending Packets with Scapy
Active Directory Introduction
Active Directory Elements
Administrating AD
Introduction to Troubleshooting
Misaligned Instructions
A Basic Python Coding Error
Finding a Broken Exploit
Network Troubleshooting
Accidental File Deletion
Understand what Nmap is
Perform basic Nmap usage
Use options in Nmap
Utilize Nmap input and output files
Create Nmap Script Engine (NSE) scripts
Assess Nmap traffic
Your team deserves training as unique as they are.
Let us tailor the course to your needs at no extra cost.
Trusted by Engineers at:
and more...
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier
Aaron Steele
Casey Pense
Chris Tsantiris
Javier Martin
Justin Gilley
Kathy Le
Kelson Smith
Oussama Azzam
Pascal Rodmacq
Randall Granier