Hands-On Hacking Training

Develop your ethical hacking skills with this action-based learning training that is 100% hands-on hacking practice with guidance from expert instructors.

Course Overview

This 5-day training course allows students to practice using the tools and tricks that make an ethical hacker great. This course is 100% hacking. Our expert instructor will be present to guide your experience and answer your questions, but your time will be spent with your fingers on a keyboard.


Hands-On Hacking Training

10/18/21 - 10/22/21 (5 days)

8:30AM - 4:30PM EST

Tysons Corner, VA
10/25/21 - 10/29/21 (5 days)

8:30AM - 4:30PM EST

10/25/21 - 10/29/21 (5 days)

8:30AM - 4:30PM EST

Columbia, MD

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Outline

TCIP Packet Analysis

  • Lab 1A: TCP/IP Packet Analysis Using Wireshark

Information Gathering

  • Lab 2A: Information Gathering

Vulnerability Analysis

  • Lab 3A: Vulnerability Analysis Using the Nessus Tool

External Penetration Testing

  • Lab 4A: Exploring and Auditing a Network Using Nmap

Internal Network Penetration

  • Lab 5A: Scanning a Local Machine for Open Ports Using TCPView
  • Lab 5B: User Activity Monitoring and Recording Using Power Spy 2013
  • Lab 5C: Capture Remote Interfaces Using Wireshark

Firewall Penetration Testing

  • Lab 6A: HTTP Tunneling to Bypass Firewalls Using HTTPort

IDS Penetration Testing

  • Lab 7A: Detecting Intrusions Using Snort
  • Lab 7B: Intrusion Detection Using KFSensor Honeypot IDS

Password Cracking Penetration Testing

Social Engineering Penetration Testing

  • Lab 9A: Social Engineering Penetration Testing Using Social Engineering Toolkit (SET)
  • Lab 9B: Intrusion Detection Using KFSensor Honeypot IDS

Web Application Penetration Testing

  • Lab 10A: Hacking Web Applications

SQL Penetration Testing

  • Lab 11A: SQL Injection Attacks on MS SQL Database


Who should take this course?

This course fortifies the experience of IT security professionals to help them recognize and quickly act to detect weaknesses and vulnerabilities within network infrastructures. Candidates include Auditors, Site Administrators, Security Officers, and IT Security Professionals.

What is the recommended experience for this course?

Candidates should have at least two years of work experience in IT security and a strong understanding of TCP/IP.

What should you expect to learn in this course?

The course objectives include:
– Knowing how to “sniff the network”
– Analysis of incoming and outgoing packets
– Troubleshooting network performance
– Use different hacking techniques to gather information about a company
– Scan a network for vulnerabilities
– Analyze network vulnerabilities
– Maintain a secure network
– Use HTTPort and HTTHost
– Protect the Network from Phishing Attacks
– Understand and recognize parameter tampering and cross-site scripting (XSS)

Subscribe now

Get new class alerts, promotions, and blog posts