A Certificate of Completion is offered for each class.
These classes will focus on the area of testing a network’s security; this will include topics such as pen testing, compliance, internal process review and strategies on keeping attackers out.
Discover flaws in database security and effectively develop strategies to keep attackers out.
Learn to be become a skilled and knowledgeable IPS tester.
The first comprehensive hands-on fuzzing course centered on the industry standard Peach Fuzzing Platform. Learn how to fuzz just about anything with Peach. No coding required, but recommended.
A practical, step-by-step approach to securing an entire organization.
Intense course encompassing binary analysis, reverse engineering and bug finding.
Intense course encompassing binary analysis, reverse engineering and bug finding.
Novice level. A highly practical course that teaches method-based hacker thinking, skills and techniques.
Novice level. A highly practical course that teaches method-based hacker thinking, skills and techniques.
Advanced level. This course is all hack, no talk.
A practical, technical course aimed at beginner penetration testers, that teaches method-based hacker thinking, skills and techniques, specifically focusing on the approach and priorities for penetration testing required by the PCI DSS standard.
Web 2.0 is a whole new world and Hacking By Numbers - Web 2.0 Edition is a course designed to prepare you for it.
You will need this course before you can take the IEM course. Earn NSA Certification.
This course dives into the newest features of the Metasploit Framework and demonstrates how to use these features in every aspect of a penetration test.
The follow-up course to the IAM. Earn NSA certification.
This workshop is geared towards security professionals whose duties and responsibilities include guiding security decisions for whole departments or even entire companies.
How to secure an SAP system? How to perform a security assessment of an SAP system? These are two questions that this course will answer.
This class includes hands-on exercises where the students get to perform security analysis and testing on a live web application supported by a back end database.
Using a combination of new tools and lesser-known techniques, attendees will learn how hackers compromise systems without depending on standard exploits.
The definitive training regimen for assessing and securing your networks.
In depth coverage of current security topics. Not for Beginners.
In depth coverage of current security topics. Not for Beginners.
If you are concerned with the security of web applications and the insecurity they introduce to your back end information systems this is the workshop for you.
Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
The CHFI course will give participants the necessary skills to identify an intruder's footprints and to properly gather the necessary evidence to prosecute.
The ECSA course equips one with the knowledge and know-hows to become an EC-Council Licensed Penetration Tester.