You've now graduated to the industry's most advanced ethical hacking course and it's time to take your pen testing skills to a new level. Learn how to orchestrate Advanced Persistent Threat (APT) attacks and defend against them.Advanced Ethical Hacking Overview
Modern networks and systems are fully patched, hardened from attack, and armored to the hilt with expensive security gear—- but the bad guys still get in on a daily basis! How do they do this? Why is there a news release every day of another Fortune 500 company hacked, more government secrets lost to the adversary?
InfoSec Institute’s Advanced Ethical Hacking Boot Camp aims to train you on how to successfully attack fully patched and hardened systems, how to circumvent common security controls, and how to get to confidential data. This is all possible if you have 0day exploits, or the ability to create your own exploit code. In this class, you will learn how to exploit modern operating system protections, such as ASLR and DEP, using ROP attacks, egghunter shellcode and heap spraying.
You take this knowledge back to your organization and can then formulate a way to defend against these sophisticated attacks. In this hands-on training class, you will learn how to:
- Create 0day (private unreleased exploits) attacks as part of the “Advanced Persistent Threat”
- Run sophisticated attacks against client side applications
- Use fuzzers and dynamic analysis to discover vulnerabilities
- Reverse engineer binaries to find new vulnerabilities never discovered before
- Exploit secured web applications
- Run chained exploits to pivot from multiple exploitable systems
- Attack and defeat VPNs, IDS/IPS and other security technologies
All of this against fully patched, fully hardened systems.
You will learn how to chain a few commonly ignored low severity vulnerabilities into a highly critical remote exploit. Once your attacks are successful, you will practice data capture. Then, learn how to intercept and replay confidential data, for example, learn how to VoIP network traffic and data mine it for authentication information.
Every evening you will put everything you learned during the day together in an all-encompassing Capture the Flag (CTF) exercise. This enables you to test that you really understand how to use what you have learned in a real world situation, with an expert instructor by your side to assist your efforts.
The goal of this course is to help you master a more efficient and effective penetration testing process. By learning how to fully utilize 0day attacks that replicate an APT attack, you become a very valuable member of any penetration testing team. This course also supports and prepares you for the CEPT and CPT certification exams.Hands-On Labs With In-Classroom Equipment:
Hundreds of exercises in over 31 separate Hands-On Labs bring up to speed with the latest threats your organization is most vulnerable to. Practice penetration testing on our virtualized environment that simulates a full range of servers and services used in a real company. Learn how to compromise web servers, virtual machines, databases, routers, firewalls, and then put it all together in an unscripted evening CTF (Capture The Flag) exercise.Nightly Capture the Flag Exercises:
Capture The Flag exercises are an opportunity for you to practice your hacking skills in a real world environment. InfoSec Institute sets up a mock company that you can attack freely without having to worry about damaging production systems. The purpose of the Capture The Flag exercises is to ensure you understand how to apply the skills you learned during the day to a real world ethical hacking scenario. The Capture The Flags usually take place after catered dinner.Best Course Evaluations In the Industry:
Over 98% of InfoSec Institute students attending our Ethical Hacking course give 10 out of 10 positive feedback. It is quite frequent that we hear that students feel this is the best IT course they have ever attended, even with students with over 20 years of experience in the IT field.Prerequisites:
- Firm understanding of the Windows Operating System
- Exposure to the Linux Operating System or other Unix-based OS
- Firm understanding of the TCP/IP protocols.
- Exposure to network reconnaissance and associated tools (nmap, nessus, netcat)
- Programming knowledge is NOT required
- Desire to learn about Ethical Hacking, and get great penetration testing training!