COURSE

Advanced Penetration Testing Course & Pen Testing Training

Course

The Advanced Penetration Testing course teaches the cyber attack lifecycle from the perspective of an adversary. Become more familiar with the most widely used penetration-testing tools, manipulate network traffic, and perform web application attacks such as cross-site scripting and SQL injection.
Full access included with 
Insider Pro
 and 
Teams

14

H

26

M
Time

advanced

i
Designed for learners who have no prior work experience in IT or Cybersecurity, but are interested in starting a career in this exciting field.
Designed for learners with prior cybersecurity work experience who are interested in advancing their career or expanding their skillset.
Designed for learners with a solid grasp of foundational IT and cybersecurity concepts who are interested in pursuing an entry-level security role.
Experience Level

15

i

Earn qualifying credits for certification renewal with completion certificates provided for submission.
CEU's

Enrollees

Learners at 96% of Fortune 1000 companies trust Cybrary

About this course

Read More

Skills you'll gain

Course Outline

1
Module 1 - Linux
1
H
4
Min
1
Module 2 - Programming
0
H
45
Min
1
Module 3 - Metasploit
1
H
10
Min
1
Module 4 - Information Gathering
1
H
10
Min
1
Module 5 - Vulnerability Discovery/Scanning
1
H
1
Min
1
Module 6 - Traffic Capture
0
H
46
Min
1
Module 7 - Exploitation
0
H
57
Min
1
Module 8 - Passwords
0
H
47
Min
1
Module 9 - Advanced Exploitation
1
H
1
Min
1
Module 10 - Post Exploitation
0
H
59
Min
1
Module 11 - WebApps
0
H
43
Min
1
Module 12 - Exploit Development
3
H
26
Min
1
Module 13 - Smartphone Pentest Framework
0
H
37
Min

Exploit Development Introduction (part 1)

Free

1m

WebApp Introduction (part 1) Web App Testing

Free

1m

Post Exploitation (part 1) File Transfer without and Interactive Shell

Free

20m

Advanced Exploitation (part 1) Introduction

Free

1m

Passwords (part 1) Password Attacks

Free

12m

Traffic Capture Introduction (part 1)

Free

1m

Exploitation (part 1) Direct Exploitation

Free

17m

Vulnerability Scanning Intro (part 1)

Free

1m

Metasploit (part 1) Introduction

Free

1m

Information Gathering Intro (part 1)

Free

1m

Programming (part 1) Fundamentals for Pen Testers

Free

1m

Linux (part 1)

Free

1m

SPF Introduction (part 1)

Free

1m

Exploit Development (part 2) A Program in Memory

Free

11m

WebApp (part 2) Vulnerable Web Applications

Free

11m

Post Exploitation (part 2) Exploit Development

Free

17m

Advanced Exploitation (part 2) Client Side Attacks

Free

11m

Passwords (part 2) Online Password Cracking

Free

5m

Traffic Capture (part 2) Analyzing Network Protocol with Wireshark

Free

8m

Exploitation (part 2) SQL Commands

Free

14m

Vulnerability Scanning (part 2) Nessus

Free

17m

Information Gathering (part 2) Domain Name Services

Free

15m

Metasploit (part 2) Fundamentals

Free

15m

Linux (part 2) Kali Linux Commands

Free

14m

Programming (part 2) Bash Scripting and If/Then Command

Free

10m

SPF (part 2) Attach to Smartphone Based Apps

Free

4m

Exploit Development (part 3) Stack Frame for Function

Free

6m

WebApp (part 3) SQL Injection

Free

14m

Post Exploitation (part 3) Pivoting

Free

8m

Advanced Exploitation (part 3) Exploiting Java

Free

7m

Passwords (part 3) Offline Password Attacks

Free

13m

Exploitation (part 3) Directory Traversal

Free

7m

Traffic Capture (part 3) Address Resolution Protocol ARP

Free

12m

Vulnerability Scanning (part 3) Nmap Scripting Engine

Free

11m

Programming (part 3) Network Pings

Free

10m

Metasploit (part 3) Operation

Free

24m

Information Gathering (part 3) Targeting Email and Maltego

Free

18m

Linux (part 3) - Directories, myfile and Nano

Free

13m

SPF (part 3) Turning an Android App into a SPF Agent

Free

8m

Exploit Development (part 4) GNU Compilers

Free

20m

WebApp (part 4) File Inclusion

Free

7m

Advanced Exploitation (part 4) Social Engineering

Free

23m

Post Exploitation (part 4) Setting Up a Domain Controller

Free

13m

Passwords (part 4) Using oclhashcat

Free

17m

Traffic Capture (part 4) DNS

Free

5m

Exploitation (part 4) Open Source Vulnerability

Free

7m

Information Gathering (part 4) recon-ng and google operators

Free

6m

Vulnerability Scanning (part 4) Metasploit

Free

10m

Metasploit (part 4) Auxiliary Module

Free

5m

Programming (part 4) Python for Port Scanning

Free

13m

Linux (part 4) chmod, manipulation and packages

Free

14m

SPF (part 4) Functionality for Agents

Free

9m

Exploit Development (part 5) Python

Free

8m

WebApp (part 5) Cross Site Scripting XSS

Free

8m

Advanced Exploitation (part 5) Bypassing Antivirus Software

Free

19m

Exploitation (part 5) Using Backdoor to Access an FTP Server

Free

7m

Traffic Capture (part 5) ettercap

Free

11m

Information Gathering (part 5) NMAP and PortScanning

Free

30m

Vulnerability Scanning (part 5) WebApp, XAMPP, WEBDAV, nikto

Free

14m

Metasploit (part 5) msfcli

Free

10m

Programming (part 5) Python Import Command

Free

11m

Linux (part 5) IP Addressing and netcat

Free

16m

SPF (part 5) Pentesting Mobile Devices

Free

14m

Exploit Development (part 6) Executing Unintended Code

Free

14m

Exploitation (part 6) Attaching to an IP Address

Free

6m

Traffic Capture (part 6) SSL Stripping

Free

10m

Vulnerability Scanning (part 6) Directory Transversals

Free

8m

Metasploit (part 6) msfvenom

Free

14m

Linux (part 6) Copy Commands and crontab

Free

5m

Exploit Development (part 7) Network Based Exploits and Debuggers

Free

15m

Exploit Development (part 8) Creating a Cyclic Pattern

Free

17m

Exploit Development (part 9) Verifying Offsets

Free

17m

Exploit Development (part 10) Creating Shell Code in Kali Linux

Free

16m

Exploit Development (part 11) Fuzzing

Free

18m

Exploit Development (part 12) Public Exploits and Perl

Free

13m

Exploit Development (part 13) Turning a 3Com Exploit into a Metasploit Module

Free

16m

Exploit Development (part 14) Structured Exception Handler Over-Write

Free

34m

SPF (part 4) Functionality for Agents

9m

Module 13 - Smartphone Pentest Framework
Exploit Development (part 5) Python

8m

Module 12 - Exploit Development
Traffic Capture (part 5) ettercap

11m

Module 6 - Traffic Capture
Vulnerability Scanning (part 5) WebApp, XAMPP, WEBDAV, nikto

14m

Module 5 - Vulnerability Discovery/Scanning
Metasploit (part 5) msfcli

10m

Module 3 - Metasploit
SPF (part 5) Pentesting Mobile Devices

14m

Module 13 - Smartphone Pentest Framework
Vulnerability Scanning (part 6) Directory Transversals

8m

Module 5 - Vulnerability Discovery/Scanning
Metasploit (part 6) msfvenom

14m

Module 3 - Metasploit
Exploit Development (part 11) Fuzzing

18m

Module 12 - Exploit Development
Course Description

*"Those who continuously acquire new and better forms of knowledge that they can apply to their work and to their lives will be the movers and shakers in our society for the indefinite future."

  • - Brian Tracy
  • Penetration testing is one of the most in-demand skill sets of the cybersecurity industry. There are more jobs that require advanced-level hacking than there are people who have the ability to fill them, and this class prepares you to confidently step into one of those roles.

    Penetration testing and ethical hacking subject matter expert, published author, and industry event speaker, Georgia Weidman teaches you advanced penetration testing based on her classic book, "Penetration Testing: a Hands-On Introduction to Hacking".

    About this Online Advanced Penetration Testing Training

    This course is a deep-dive into the world of advanced pen-testing, and there are no life jackets - only binaries. Real-world unethical hackers are becoming increasingly more devious and cunning when it comes to technology. That means that more advanced level ethical hackers are needed to penetration test and help create more secure networks and systems for our modern, high-security environments. Georgia Weidman, penetration testing and hacking subject matter expert, author, and well-known industry event speaker will teach you everything you need to know!

    If you're looking for a comprehensive introduction to penetration testing, please see we also have our [Ethical Hacking and Penetration Testing course](https://www.cybrary.it/course/ethical-hacking/).

    What Is Involved in this Advanced Penetration Testing Course?

    In our online Advanced Penetration Testing training class, you'll learn how to use advanced techniques and well-known pen-testing tools in more sophisticated ways. You’ll learn to exploit networks using various methods, including SQL injection attacks, cross-site scripting, and local and remote file inclusion while also gaining the knowledge of how to defend the network you are penetrating. You’ll learn how to use social engineering to bypass technology controls and break into a network. You'll also learn the post-exploitation process, such as how to backdoor SSH logins, enable RDP, and use other data exfiltration techniques.

    The Advanced Penetration Testing course has a total clock time of 14 hrs. and 26 mins. and you will receive a certificate of completion upon finishing the course.

    Are There Prerequisites for the Advanced Penetration Testing Training?

    While there are no prerequisites for this course, it is primarily designed for penetration testers who are looking for more advanced level techniques that will help them better protect high-security organizations. It's recommended that students are familiar with IT security best practices and have a working knowledge of TCP/IP and common web technologies, including:

  • Windows administration for servers and workstations
  • Linux/ NIX system administration
  • Command-line proficiency on both Windows and NIX systems
  • They should also have some basic knowledge of the following languages:

  • Python
  • HTML
  • JavaScript
  • SQL
  • What Does an Advanced Penetration Tester Do?

    An advanced penetration tester is an IT professional who identifies the vulnerabilities in network and software security and then provides suggestions and methods for how to resolve those gaps.

    Advanced penetration testers use the same exploitation techniques as a cyber attacker but with the motivation to help prevent those attacks. Just as a criminal hacker takes a high-level look at an organization's technical landscape to determine how to proceed with an attack, penetration testers investigate the complexities of the infrastructure to identify attacks before they happen. Because penetration testers use the same tools and strategies that criminal attackers use to identify vulnerabilities, they are able to uncover the areas within systems, networks, and applications that are most at risk for attack. Penetration tests are now essential in corporate environments with a mature cybersecurity strategy.

    Why Take the Advanced Penetration Testing Course?

    As one of the categories of illegal activities, Cybercrime now ranks third in dollar value worldwide. In 2018, a [study by the Center for Strategic and International Studies (CSIS)](https://www.mcafee.com/enterprise/en-us/assets/reports/restricted/rp-economic-impact-cybercrime.pdf), in partnership with McAfee, concluded that close to $600 billion, nearly one percent of global GDP, is lost to cybercrime each year. To combat the ever-rising threat of cyberattacks, more organizations are working to develop strategies to fight and prevent these attacks. As a result, the cybersecurity job market is expanding. It is no longer sufficient to deal with attacks as they happen, companies need professional penetration testers to perform penetration testing proactively.

    Taking the Advanced Penetration Testing course will help prepare you to enter a field where you will be in demand, making the potential for advancement greater than in other industries. If you have a passion for information security and you want to be a pen tester, this is definitely the course for you.

    Train Your Team

    Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.

    Included in a Path

    Instructors

    Georgia Weidman
    Founder and CTO at Shevirah and Bulb Security
    Read Full Bio
    Learn

    Learn core concepts and get hands-on with key skills.

    Practice

    Exercise your problem-solving and creative thinking skills with security-centric puzzles

    Prove

    Assess your knowledge and skills to identify areas for improvement and measure your growth

    Get Hands-on Learning

    Put your skills to the test in virtual labs, challenges, and simulated environments.

    Measure Your Progress

    Track your skills development from lesson to lesson using the Cybrary Skills Tracker.

    Connect with the Community

    Connect with peers and mentors through our supportive community of cybersecurity professionals.

    Success from Our Learners

    "Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

    Don Gates

    Principal Systems Engineer/SAIC

    "Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

    Cory

    Cybersecurity analyst/

    "I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

    Mike

    Security Engineer and Pentester/

    "Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

    Don Gates

    Principal Systems Engineer/SAIC

    "Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

    Cory

    Cybersecurity analyst/

    "I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

    Mike

    Security Engineer and Pentester/

    "Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

    Cassandra

    Information Security Analyst/Cisco Systems

    "I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

    Casey

    Cyber Systems Engineer/BDO

    "Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

    Angel

    Founder,/ IntellChromatics.

    Advanced Penetration Testing Course & Pen Testing Training

    The Advanced Penetration Testing course teaches the cyber attack lifecycle from the perspective of an adversary. Become more familiar with the most widely used penetration-testing tools, manipulate network traffic, and perform web application attacks such as cross-site scripting and SQL injection.
    14
    26
    M
    Time
    advanced
    difficulty
    15
    ceu/cpe

    Course Content

    Course Description

    *"Those who continuously acquire new and better forms of knowledge that they can apply to their work and to their lives will be the movers and shakers in our society for the indefinite future."

  • - Brian Tracy
  • Penetration testing is one of the most in-demand skill sets of the cybersecurity industry. There are more jobs that require advanced-level hacking than there are people who have the ability to fill them, and this class prepares you to confidently step into one of those roles.

    Penetration testing and ethical hacking subject matter expert, published author, and industry event speaker, Georgia Weidman teaches you advanced penetration testing based on her classic book, "Penetration Testing: a Hands-On Introduction to Hacking".

    About this Online Advanced Penetration Testing Training

    This course is a deep-dive into the world of advanced pen-testing, and there are no life jackets - only binaries. Real-world unethical hackers are becoming increasingly more devious and cunning when it comes to technology. That means that more advanced level ethical hackers are needed to penetration test and help create more secure networks and systems for our modern, high-security environments. Georgia Weidman, penetration testing and hacking subject matter expert, author, and well-known industry event speaker will teach you everything you need to know!

    If you're looking for a comprehensive introduction to penetration testing, please see we also have our [Ethical Hacking and Penetration Testing course](https://www.cybrary.it/course/ethical-hacking/).

    What Is Involved in this Advanced Penetration Testing Course?

    In our online Advanced Penetration Testing training class, you'll learn how to use advanced techniques and well-known pen-testing tools in more sophisticated ways. You’ll learn to exploit networks using various methods, including SQL injection attacks, cross-site scripting, and local and remote file inclusion while also gaining the knowledge of how to defend the network you are penetrating. You’ll learn how to use social engineering to bypass technology controls and break into a network. You'll also learn the post-exploitation process, such as how to backdoor SSH logins, enable RDP, and use other data exfiltration techniques.

    The Advanced Penetration Testing course has a total clock time of 14 hrs. and 26 mins. and you will receive a certificate of completion upon finishing the course.

    Are There Prerequisites for the Advanced Penetration Testing Training?

    While there are no prerequisites for this course, it is primarily designed for penetration testers who are looking for more advanced level techniques that will help them better protect high-security organizations. It's recommended that students are familiar with IT security best practices and have a working knowledge of TCP/IP and common web technologies, including:

  • Windows administration for servers and workstations
  • Linux/ NIX system administration
  • Command-line proficiency on both Windows and NIX systems
  • They should also have some basic knowledge of the following languages:

  • Python
  • HTML
  • JavaScript
  • SQL
  • What Does an Advanced Penetration Tester Do?

    An advanced penetration tester is an IT professional who identifies the vulnerabilities in network and software security and then provides suggestions and methods for how to resolve those gaps.

    Advanced penetration testers use the same exploitation techniques as a cyber attacker but with the motivation to help prevent those attacks. Just as a criminal hacker takes a high-level look at an organization's technical landscape to determine how to proceed with an attack, penetration testers investigate the complexities of the infrastructure to identify attacks before they happen. Because penetration testers use the same tools and strategies that criminal attackers use to identify vulnerabilities, they are able to uncover the areas within systems, networks, and applications that are most at risk for attack. Penetration tests are now essential in corporate environments with a mature cybersecurity strategy.

    Why Take the Advanced Penetration Testing Course?

    As one of the categories of illegal activities, Cybercrime now ranks third in dollar value worldwide. In 2018, a [study by the Center for Strategic and International Studies (CSIS)](https://www.mcafee.com/enterprise/en-us/assets/reports/restricted/rp-economic-impact-cybercrime.pdf), in partnership with McAfee, concluded that close to $600 billion, nearly one percent of global GDP, is lost to cybercrime each year. To combat the ever-rising threat of cyberattacks, more organizations are working to develop strategies to fight and prevent these attacks. As a result, the cybersecurity job market is expanding. It is no longer sufficient to deal with attacks as they happen, companies need professional penetration testers to perform penetration testing proactively.

    Taking the Advanced Penetration Testing course will help prepare you to enter a field where you will be in demand, making the potential for advancement greater than in other industries. If you have a passion for information security and you want to be a pen tester, this is definitely the course for you.

    This course is part of a Career Path:
    No items found.

    Instructed by

    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a Advanced Penetration Testing Course & Pen Testing Training Certificate of Completion