Toll Free: 1.877.290.9507 | Direct:708.689.0131

Advanced Penetration Testing, Ethical Hacking, and Advanced Persistent Threat

Modern networks and systems are fully patched, hardened from attack, and armored to the hilt with expensive security gear --- but the bad guys still get in on a daily basis! How do they do this? Why is there a news release every day of another Fortune 500 company hacked, more government secrets lost to the adversary?

InfoSec Institute’s Advanced Ethical Hacking Boot Camp aims to train you on how to successfully attack fully patched and hardened systems, how to circumvent common security controls, and how to get to confidential data. You take this knowledge back to your organization and can then formulate a way to defend against these sophisticated attacks.

Information about this course:

This course is offered as:

  • Classroom Instructor-led Boot Camp
  • Live Online Instructor-led Boot Camp
  • Mentored Self-Paced Online
  • Streaming-Only Self-Paced Online

$-,---

View Course Pricing

and what is included with your enrollment

Course Highlights
  • High Pass Rates - Exam Pass Guarantee!
  • Top Instructors - Readily Available
  • Hands-on skills training and test preparation
award-winning-training
In this hands-on training class, you will learn how to:
  • Leverage 0day (private unreleased exploits) attacks as part of the “Advanced Persistent Threat”
  • Run sophisticated attacks against client side applications
  • Use fuzzers and dynamic analysis to attack custom and COTS apps
  • Reverse engineer binaries to find new vulnerabilities never discovered before
  • Exploit secured web applications
  • Run chained exploits to pivot from multiple exploitable systems
  • Attack and defeat VPNs, IDS/IPS and other security technologies

All of this against fully patched, fully hardened systems.

You will learn how to chain a few commonly ignored low severity vulnerabilities into a highly critical remote exploit. Once your attacks are successful, you will practice data capture. Then, learn how to intercept and replay confidential data, for example, learn how to VoIP network traffic and data mine it for authentication information.

Every evening you will put everything you learned during the day together in an all-encompassing Capture the Flag (CTF) exercise. This enables you to test that you really understand how to use what you have learned in a real world situation, with an expert instructor by your side to assist your efforts.

The goal of this course is to help you master a more efficient and effective penetration testing process. By learning how to fully utilize 0day attacks that replicate an APT attack, you become a very valuable member of any penetration testing team. This course also supports and prepares you for the CEPT and ECSA certification exams.

HANDS-ON LABS WITH IN-CLASSROOM EQUIPMENT:

Hundreds of exercises in over 31 separate Hands-On Labs bring up to speed with the latest threats your organization is most vulnerable to. Practice penetration testing on our virtualized environment that simulates a full range of servers and services used in a real company. Learn how to compromise web servers, virtual machines, databases, routers, firewalls, and then put it all together in an unscripted evening CTF (Capture The Flag) exercise.


At Intense School, we want you to succeed. Because of our dedication to our students we make an effort to constantly add new and improved items to our courses. We recently added the latest and greatest hacking tools ever you for you to expand your hacking knowledge - BackTrack, Core Impact, Canvas, and more. Our team of 3l33t hacking instructors live by the credo “give a geek a tool, and he can fix a problem.  Teach him to hack and he will be fixing everybody’s problems”.

s
Intense School has held CISSP Boot Camp courses in or near:

The most current, up-to-date Advanced Ethical Hacking training available anywhere:

Black Hat hackers are always changing their tactics to get one step ahead of the good guys. InfoSec Institute updates our course materials regularly to ensure that you learn about the most current threats to your organization's networks and systems.

This course focuses on advanced exploitation techniques. A brief introduction to system exploitation theory and process will be covered, the rest of the course covers advanced topics, such as:

  • System Exploitation Process
  • Replicating the process and architecture of APT attacks
  • Attacking fully patched systems
  • Buffer Overflows against Windows 2008 Server, Windows 7 clients
  • 0day attacks
  • Attacking DMZs and other secured infrastructure
  • Port Redirection
  • Compromising secured infrastructure
  • Using egghunter and meterpreter shellcode
  • Metasploit scripting and automation
  • NMAP automation
  • Running exploits in RAM vs. on disk
  • Hiding from IDSs
  • Covert Channels
  • Privilege Escalation attacks on Windows 7
  • Advanced Man In The Middle Attacks
  • Traffic Interception
  • Hijacking SSL encrypted sessions
  • MiTM VoIP attacks
  • Intercepting VoIP traffic and attacking Ethernet enabled PBXs
  • 0day vuln discovery process
  • Format String attacks
  • Windows SEH Stack Overflows
  • Writing Windows Shellcode
  • Heap Spraying / JIT Spraying
  • Fuzzer selection and comparison
  • Fuzzing with peachfuzz and SPIKE
  • Binary Auditing with IDA Pro
  • Portable Executable (PE) Compression and Encoding
  • Using a Disassembler
  • Anti-disassembling Detection circumvention
  • Web app fuzzing
  • Advanced SQL Injection
  • Cross Site Request Forgery Attacks
  • XSSAttacks and XSS Redirection
  • RFI and Source Code Injection Attacks
  • Proxy cache poisoning
What’s Included:
  • 5 Days of Expert Security Training Instruction from a hacking instructor with real-world hacking experience and deep knowledge of course content.
  • Guaranteed access to Expert Instruction in an intimate learning setting not offered at any of our competitors.
  • InfoSec's Custom Advanced Hacking Tools Enterprise Suite, includes every program covered in the course for at home study. (477 Tools).
  • Boot camp style training --- our instructors teach from 8am to 10:30pm every day. Course runs from 8am to 5pm daily with optional ethical capture the flag hacking exercises to 10:30pm.
  • All meals included.
  • Certified Expert Penetration Tester exam fees.
  • Lecture, Lab Exercise and Text book --- Train your ethical friends and co-workers hacking!  
Career Path-Related Courses

The courses below are excellent follow-on classes, once the Ethical Hacking Boot Camp has been completed:

Click here to get more information about this class!

Instantly View Course Syllabus and price

View Course Calendar

Unfortuantely, no public enrollment courses currently match your criteria. Contact Us Here to find out other options with this class.

This really helped my knowledge level concerning not only hacker tools and tactics, but also my general understanding of network operations and protocols. I look forward to attending another Intense School class.

- Anthony Koury
Vandenberg Air Force Base, CA

Steve DeFino has set the standard for instruction. Innovative and teaches you how to think through a problem with sound logic.

- Mario Rodriguez,
US Army

It was fantastic! I learned more then i could have ever dreamed! even if I dont pass the exam the knowledge i got was well worth the money I spent!! and i had a good time leanring as well!

- James Hollyer

Select the type of training that best fits your schedule and learning style!

Live, Online, Self-Paced, Classroom - contact us for details on each.

Self-Paced

Streaming Only

Base Course. Best for refresher courses

  • Easy Online Access
  • Expert Instructor
  • Exam Review
  • Highest Quality Content - 90% Pass
  • Self-Paced Training
Self-Paced

Mentored Online

Most popular self-pace option.

  • Online & Offline Playback (DVD,mobile)
  • Expert Instructor
  • Intense Proprietary Exam Prep
  • Highest Quality Content - 90% Pass
  • Self-Paced Mentored Training
  • Mentor & Live Instructor Support
  • Text books, Pre-Study, and Lab books
  • Complex Sims and Exercise Files
Classroom

Instructor-Led

Our top rated trainign experience

  • Live Classroom
  • Expert Instructor constantly available
  • Intense Proprietary Exam Prep
  • Highest Quality Content - 90% Pass
  • Self-Paced Training (optional add-on)
  • Extensive Live Instructor Support
  • Our highest pass rate course version
  • Text books, Pre-Study, and Lab books
  • Complex Sims and Exercise Files
Classroom

Live Online

As close to the classroom from home

  • Live Classroom
  • Expert Instructor constantly available
  • Intense Proprietary Exam Prep
  • Highest Quality Content - 90% Pass
  • Self-Paced Training (optional add-on)
  • Extensive Live Instructor Support
  • Text books, Pre-Study, and Lab books
  • Complex Sims and Exercise Files
Prerequisites?
  • Firm understanding of the Windows Operating System
  • Exposure to the Linux Operating System or other Unix-based OS
  • Grasp of the TCP/IP protocols
  • Exposure to network reconnaissance and associated tools (nmap, nessus, netcat)
  • Programming knowledge is NOT required
  • Desire to learn about the hacking and network security profession, stay ethical, and get great security training!

The TOTAL Immersion Experience
During the 5 day program, our instructors give you 100% of their time and dedication to ensure that your time
is well spent. You will receive an all-inclusive immersion experience by receiving your hotel stay and most meals during your training experience; you eat, sleep and train at the learning facility with no distractions!

Certifications

CISSP®

States