Penetration Testing Online Training

    Taught by
    UPDATED: April 14, 2013
    Intermediate

    Master cybersecurity methods and tools in this intermediate Penetration Testing training. Learn techniques like white-box, black-box, and grey-box testing, and use Kali Linux for vulnerability analysis. This Penetration Testing course is ideal for IT professionals with network or systems experience, this course covers tools like BackTrack, WPA2 cracking, DNS spoofing, and exploiting systems, helping you become a skilled penetration tester.

    Start a free week

    Subscription options

    $59.00

    Access all premium content with a free week!

    • Quizzes
    • CyberVista® IT practice exams
    • Coaching
    • IT learner community
    Start a free week
    G2 Logo
    4.5 reviews stars

    What you'll learn

    • Using tools like BackTrack and Kali Linux in penetration testing
    • Uncovering hidden SSIDs
    • Bypassing MAC address filters
    • Breaking or cracking WPA2 wireless
    • Leveraging DHCP Starvation
    • Using CDP Flooding
    • PWNing a system with MSF
    • Exploiting DNS Spoofing
    • Detecting rootkits

    FAQs

    What exactly is penetration testing?

    Penetration testing, often referred to simply as pentesting, is a special cybersecurity technique that simulates real-world cyberattacks to test a network or system's security. Pentesting is considered a proactive cybersecurity technique, which means it's used to seek out and discover previously unknown vulnerabilities. When a vulnerability is discovered during pen testing, part of the process is to document and prove the vulnerability so that it can be fixed and made secure.

    Is penetration testing a hard job?

    Yes, penetration testing can be a hard job for a few reasons – not least of which is the technical complexity of the job as well as the evolving nature of cybersecurity threats. Doing penetration testing professionally requires training and practice using specialized tools and techniques. The information uncovered by a penetration test is often highly technical and must be analyzed by someone with experience with the network and the vulnerability.

    What field of work is penetration testing?

    Penetration testing is a part of the broader field of cybersecurity. Cybersecurity involves all the practices and technologies that keep computer systems, networks and data safe from unauthorized access and threats. Penetration testing is a specialized skill, and it isn't something that's expected of every cybersecurity professional. In fact, the sensitive nature of penetration testing usually means that tests are done by dedicated professionals or teams, sometimes even third-party experts.

    What are the key principles of penetration testing?

    Penetration testing is a large field with professionals from different backgrounds and experiences, so the key principles can change from one pentester to the next. But generally speaking, thorough assessment, simulation of real-world attacks and actionable recommendations are the foundational principles of professional penetration testing. Penetration testing involves ethical hacking techniques and comprehensive analysis, leading to identifying system vulnerabilities, those key principles ensure the information uncovered is useful and accurate.

    Who should take this course on penetration testing?

    Penetration testing is a specialized career field, and one of the more challenging cybersecurity roles to be qualified for – so the best audience for this course are cybersecurity professionals who would like to advance their career into a specialized niche. Software developers and systems administrators can also learn a lot about security practices by taking this course – ensuring that their networks and code are much better protected from bad actors.

    Who is this for?

    This Penetration Testing training is based on professional-level security training, which means it was designed for experienced IT professionals. This penetration testing skills course is designed for IT professionals with three to five years of experience with network, server, or systems administrator.

    target-audience-face-2target-audience-face-6target-audience-face-12

    What our learners say

    • It feels like the best and the brightest people are training with you — and they are just hanging out with you and showing you the ropes.

      John McCann | IT manager and CBT Nuggets learner
    • Very easy and fun way to learn. Keith Barker is my favorite, he'll throw in jokes here and there and it makes me remember certain study points. I highly recommend this app and purchasing subscriptions, it is truly worth the money.

      Joshua E. | IT Systems Administrator
    • Having access to on-demand labs that I could spin up instantly was very helpful. I didn’t have to have a home environment with a bunch of virtual machines spun up. Or worry about destroying things.

      Brian V. | Monitoring Engineer
    Study plan

    Download the free Penetration Testing Online Training study plan to complete this course in about 12 hours.

    Download study plan

    Related Topics

    Get CBT Nuggets IT training news and resources

    I have read and understood the privacy policy and am able to consent to it.

    © 2024 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522