Penetration Testing

Leverage the latest penetration testing tools and learn how to identify and mitigate vulnerabilities. Understand penetration testing methodology as you progress through our security and vulnerability testing courses tailored for network and application administrators.

Courses
Newest Courses
Penetration testing is in high demand with the need to meet compliance standards and combat security breaches. In this course, Penetration Testing: Setting the Scope and Rules of Engagement, you'll learn fundamental knowledge and gain the ability to scope a penetration testing engagement with...
What's penetration testing? Well it's simple, as security professionals our job is to make it extremely difficult to get inside our systems. Remember, you can't stop attackers, your job is to slow them down. How? Let's start by doing exactly what the attacker will do. Penetration testing (pen...
In this course, Web Application Penetration Testing with Burp Suite, you will learn hands-on techniques for attacking web applications and web services using the Burp Suite penetration testing tool. This course is designed to expand your knowledge of the Burp Suite beyond just capturing...
Did you know Burp Suite makes automation, data exfiltration, and customization techniques possible to help make you an even better pentester? This advanced course, Advanced Web Application Penetration Testing with Burp Suite, is designed to expand your knowledge of the Burp Suite product to...
Get a good understanding on how to use Python to automate your web penetration testing scenarios. In this course, Penetration Testing Automation Using Python and Kali Linux, you'll learn how to start automating your penetration testing tasks using Python and Kali Linux. First, you'll learn...
Wireless networks are everywhere but are they really secure? How easy would it be for an attacker to hack into your network? In this course, Wireless Network Penetration Testing, you'll learn about the most common attack techniques against wireless networks. First, you'll explore the wireless...
This course introduces ethical hackers and penetration testers to Kali Linux. This course will show IT professionals how to use the ethical hacking techniques and how to conduct a professional penetration test workflow using the Swiss Army Knife operating system Kali Linux.
At the core of the penetration testing process is a thorough knowledge of open source intelligence (OSINT) gathering. In this course, Penetration Testing OSINT Gathering with Recon-ng, you'll learn how to use the free Recon-ng framework to find possible infrastructure vulnerabilities. First,...
Operations security or OPSEC is a topic of security method for helping with the penetration testing workflow. In this course, OPSEC for Penetration Testers, you'll follow the story of a penetration tester that will test the security of a website. In each of the engagement phases,...
Metasploit is one of the most widely used tools for penetration testing, providing powerful attack simulations, security assessment management, and more. In this course, Introduction to Penetration Testing Using Metasploit, you'll learn to use Metasploit to enumerate available services,...