Free

Advanced Penetration Testing Course & Pen Testing Training

The Advanced Penetration Testing course teaches the cyber attack lifecycle from the perspective of an adversary. Become more familiar with the most widely used penetration-testing tools, manipulate network traffic, and perform web application attacks such as cross-site scripting and SQL injection.
14
26
M
Time
advanced
difficulty
15
ceu/cpe

Course Content

Exploit Development Introduction (part 1)

1m

Module 12 - Exploit Development
Advanced Exploitation (part 1) Introduction

1m

Module 9 - Advanced Exploitation
Traffic Capture Introduction (part 1)

1m

Module 6 - Traffic Capture
Vulnerability Scanning Intro (part 1)

1m

Module 5 - Vulnerability Discovery/Scanning
Information Gathering Intro (part 1)

1m

Module 4 - Information Gathering
Linux (part 1)

1m

Module 1 - Linux
SPF Introduction (part 1)

1m

Module 13 - Smartphone Pentest Framework
Vulnerability Scanning (part 2) Nessus

17m

Module 5 - Vulnerability Discovery/Scanning
Course Description

*"Those who continuously acquire new and better forms of knowledge that they can apply to their work and to their lives will be the movers and shakers in our society for the indefinite future."

  • - Brian Tracy
  • Penetration testing is one of the most in-demand skill sets of the cybersecurity industry. There are more jobs that require advanced-level hacking than there are people who have the ability to fill them, and this class prepares you to confidently step into one of those roles.

    Penetration testing and ethical hacking subject matter expert, published author, and industry event speaker, Georgia Weidman teaches you advanced penetration testing based on her classic book, "Penetration Testing: a Hands-On Introduction to Hacking".

    About this Online Advanced Penetration Testing Training

    This course is a deep-dive into the world of advanced pen-testing, and there are no life jackets - only binaries. Real-world unethical hackers are becoming increasingly more devious and cunning when it comes to technology. That means that more advanced level ethical hackers are needed to penetration test and help create more secure networks and systems for our modern, high-security environments. Georgia Weidman, penetration testing and hacking subject matter expert, author, and well-known industry event speaker will teach you everything you need to know!

    If you're looking for a comprehensive introduction to penetration testing, please see we also have our [Ethical Hacking and Penetration Testing course](https://www.cybrary.it/course/ethical-hacking/).

    What Is Involved in this Advanced Penetration Testing Course?

    In our online Advanced Penetration Testing training class, you'll learn how to use advanced techniques and well-known pen-testing tools in more sophisticated ways. You’ll learn to exploit networks using various methods, including SQL injection attacks, cross-site scripting, and local and remote file inclusion while also gaining the knowledge of how to defend the network you are penetrating. You’ll learn how to use social engineering to bypass technology controls and break into a network. You'll also learn the post-exploitation process, such as how to backdoor SSH logins, enable RDP, and use other data exfiltration techniques.

    The Advanced Penetration Testing course has a total clock time of 14 hrs. and 26 mins. and you will receive a certificate of completion upon finishing the course.

    Are There Prerequisites for the Advanced Penetration Testing Training?

    While there are no prerequisites for this course, it is primarily designed for penetration testers who are looking for more advanced level techniques that will help them better protect high-security organizations. It's recommended that students are familiar with IT security best practices and have a working knowledge of TCP/IP and common web technologies, including:

  • Windows administration for servers and workstations
  • Linux/ NIX system administration
  • Command-line proficiency on both Windows and NIX systems
  • They should also have some basic knowledge of the following languages:

  • Python
  • HTML
  • JavaScript
  • SQL
  • What Does an Advanced Penetration Tester Do?

    An advanced penetration tester is an IT professional who identifies the vulnerabilities in network and software security and then provides suggestions and methods for how to resolve those gaps.

    Advanced penetration testers use the same exploitation techniques as a cyber attacker but with the motivation to help prevent those attacks. Just as a criminal hacker takes a high-level look at an organization's technical landscape to determine how to proceed with an attack, penetration testers investigate the complexities of the infrastructure to identify attacks before they happen. Because penetration testers use the same tools and strategies that criminal attackers use to identify vulnerabilities, they are able to uncover the areas within systems, networks, and applications that are most at risk for attack. Penetration tests are now essential in corporate environments with a mature cybersecurity strategy.

    Why Take the Advanced Penetration Testing Course?

    As one of the categories of illegal activities, Cybercrime now ranks third in dollar value worldwide. In 2018, a [study by the Center for Strategic and International Studies (CSIS)](https://www.mcafee.com/enterprise/en-us/assets/reports/restricted/rp-economic-impact-cybercrime.pdf), in partnership with McAfee, concluded that close to $600 billion, nearly one percent of global GDP, is lost to cybercrime each year. To combat the ever-rising threat of cyberattacks, more organizations are working to develop strategies to fight and prevent these attacks. As a result, the cybersecurity job market is expanding. It is no longer sufficient to deal with attacks as they happen, companies need professional penetration testers to perform penetration testing proactively.

    Taking the Advanced Penetration Testing course will help prepare you to enter a field where you will be in demand, making the potential for advancement greater than in other industries. If you have a passion for information security and you want to be a pen tester, this is definitely the course for you.

    This course is part of a Career Path:
    No items found.

    Instructed by

    Instructor
    Georgia Weidman

    My work in the field of smartphone exploitation has been featured internationally in print and on television. I have presented and conducted training around the world including venues such as NSA, West Point, and Black Hat.

    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a Advanced Penetration Testing Course & Pen Testing Training Certificate of Completion

    Coming mid-July
    Cybrary Reimagined.
    Level up with structured, role-aligned career paths.
    ALL NEW!
    Cybrary Reimagined.
    Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
    Level up with structured, role-aligned career paths.
    Valid until October 31. Elevate your skills today!
    Start Now

    Heading

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    This is some text inside of a div block.
    Share

    Purpose Statement

    Cybrary Career Paths are comprehensive training programs designed to prepare you for the most in-demand roles in the cybersecurity workforce. Each path follows a Learn, Practice, Prove model and includes different activity types aligned to key topics within the path’s security domain. As you progress through the path, your progress will be measured in real time using Experience Points (XP) that serve as a comprehensive capability score for each topic. Upon completing all of the requirements for a path, you will be rewarded with a shareable digital badge via Credly.
    This is some text inside of a div block.
    This is some text inside of a div block.
    M
    Time
    This is some text inside of a div block.
    difficulty
    This is some text inside of a div block.
    ceu/cpe

    Overview

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    Frequently Asked Questions
    No items found.
    What Will I Learn?
    Foundations
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Defensive Security
    Focused on trying to find the bad guys. Topics such as threat intelligence, threat hunting, network monitoring, incident response. Defensive security is a reactive measure taken once a vulnerability is found through prevention, detection, and response.
    Engineering and Operations
    Focused on building and operating information systems.
    Governance, Risk, and Compliance
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Leadership and Management
    Focused on program design and oversight. Covers project and program management.
    Offensive Security
    Focused on validating security controls by trying to break them (i.e. penetration testing or ethical hacking). Topics such as Kali Linux, metasploit, scanning, and privilege escalation. Offensive security seeks out the problem or vulnerability through ethical hacking and finds a solution to disable the operation.
    Offensive Security
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Path Outline

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    Course Outline

    No items found.
    No items found.
    No items found.

    What Our Learners Are Saying

    Join 3 million+ users, including 96% of Fortune 1000 companies who use our platform to upskill their teams. See what the buzz is about - start learning for free!

    No items found.