Toll Free: 1.877.290.9507 | Direct:708.689.0131

Penetration Testing Online

Penetration Testing Online

Intense School's Penetration Testing Online is the most comprehensive online penetration testing course in existence. You get the same content that is delivered in our 10 Day Penetration Testing Boot Camp in an online format. The online version contains over 100 modules and over 100 hours of online training. Because of the amount of material available, most students take the full 60 days to complete the online format of the course!

We have made every effort to replicate the same training experience you would have attending our
10 Day Penetration Testing Boot Camp course in person. Many online or CBT training offerings are simply a recording of a talking head. Intense School's Application Security Online includes a shipment of software that is loaded onto your computer, which allows you to complete
over 30 hours of hands-on lab exercises! Not only do you get high quality instruction from an expert instructor, with InfoSec Institute, you also perform hands-on lab exercises that allow for real knowledge transfer.

Information about this course:

View schedule for classroom bootcamps

This course is offered as:

  • Classroom Instructor-led Boot Camp
  • Live Online Instructor-led Boot Camp
  • Mentored Self-Paced Online
  • Streaming-Only Self-Paced Online


View Course Pricing

and what is included with your enrollment


Some of the benefits of Penetration Testing Online are:
  • Attend the exact same course as the Instructor-Led 10 Day Penetration Testing Boot Camp course in an online format.
  • Interact with over 100 online modules, taught by an expert instructor.
  • We ship you a number of Virtual Machines (VMs) pre-installed with hundreds of tools and scripts that you use to perform over 65 hands-on lab exercises. These are the same lab exercises as the instructor-led class.
  • Get online guidance while you perform the lab exercises, the labs have been recorded from start to finish.
  • Prepare yourself for the CEH, CPT, CEPT, ECSA and LPT certifications from home. When you purchase Penetration Testing Online, you automatically get an exam voucher for the CPT, CEPT and CEH certifications.
  • You will learn everything there is to know about penetration testing, from the use of network reconnaissance tools, to the writing of custom zero-day buffer overflow exploits.

The goal of this course is to help you master a repeatable, documentable penetration testing methodology that can be used in an ethical penetration testing or hacking situation. This penetration testing training course has a significant Return on Investment, you walk out the door with hacking skills that are highly in demand, as well as up to five certifications (CEH, CEPT, CPT, ECSA and the LPT)!

Run hacking attacks in our classroom labs, be a hacker for a week:

Some of the hacking concepts you will learn to master during this hands on hacking course....

  • Security testing methodologies
  • Stealthy network recon
  • Passive traffic identification
  • Remote root vulnerability exploitation
  • Privilege escalation hacking
  • IPv6 Vulnerabilities
  • Remote access trojan hacking
  • Running shellcode in RAM vs. on disk
  • Wireless insecurity
  • Breaking IP-based ACLs via spoofing
  • Abusing Windows Named Pipes for Domain Impersonation
  • Evidence removal and anti-forensics
  • Attacking network infrastructure devices
  • Hacking by brute forcing remotely
  • Hiding exploit payloads in jpeg and gif image files
  • Hacking Web Applications
  • Breaking into databases with SQL Injection
  • Cross Site Scripting hacking
  • Justifying a penetration test to management and customers
  • CEH review
  • Defensive techniques
  • Writing buffer overflow exploits
  • dlmalloc Heap Overflow exploits
  • Win32 Heap Overflow exploits
  • Linux stack overflow exploits
  • Defeating non-exec stacks
  • Return-to-libc shellcode
  • Function pointer overwrites
  • Crafting Injectable Shellcode
  • Defeating non-executable stacks
  • Linux LKM Rootkits
  • Windows Kernel Rootkits
  • Reverse engineering training
  • Vulnerability development and discovery
  • Attacking and blinding IDSs
  • Hiding your attacks from IDSs
  • Encrypted covert channels
  • Global Offset Table Overwrites
  • Windows Shellcode
  • Integer Overflows
  • Linux shellcode
  • "no listening port" trojans
  • A whole day on breaking through enterprise DMZs
  • Reconstructing binaries from sniffed traffic
  • Circumventing antivirus
  • Bi-directional Spoofed Communication
  • Session fixation
  • Advanced SQL Injection
  • Justifying a penetration test to management and customers
  • Defensive techniques
Some of the instructor-led hands-on hacking lab exercises in this security training experience.:
  • Abusing DNS for host identification
  • Leaking system information from Unix and Windows
  • Windows 2003 Server & Vista DNS Cache Poisoning Attacks
  • Unix, Windows and Cisco password cracking
  • Remote buffer overflow exploit lab - heap vs. stack overflows
  • Attacking Kerberos Pre-Auth Hashes
  • Spoofing endpoints of communication tunnels
  • Impersonation of other Users- Hijacking kernel tokens
  • Attacking RDP (Remote Desktop Protocol) in Windows XP, 2003 & Vista
  • Remote keylogging
  • Data mining authentication information from clear-text protocols
  • Sniffing and hijacking SSL encrypted sessions
  • Breaking wireless security via hacking
  • Malicious event log editing
  • Client side IE & Firefox exploits
  • Hacking into Cisco routers
  • Tunneling through IPSec VPNs by abusing ESP
  • Data retrieval with SQL Injection Hacking
  • Calculating the Return on Investment (ROI) for an ethical hack
  • Writing a stack buffer overflow
  • Porting exploits to metasploit modules
  • Find socket shellcode
  • Writing shellcode for Linux
  • Using Ollydbg for Win32 Exploits
  • Windows Kernel-Mode Rootkits
  • LKM Rootkits
  • Using IDA Pro for Reversing
  • Reconstructing sniffed images
  • Reverse engineering Windows PE Binaries
  • Session hijacking
  • Passive Network Analysis
  • Exploitation with a remote GUI
  • Sniffing SSL Encrypted Sessions
  • Format string exploits
  • Heap overflow exploits
  • Windows exploits
  • Calculating offsets
  • Reversing with SoftIce
  • OS determination without touching the target
  • SQL Injection timing attacks
  • Port redirection
  • ASP source disclosure attacks
  • Call-Back Backdoors
  • Encrypted covert channels
  • Remote keyloggers
  • PHP/MySQL SQL Injection
  • Inserting Malicious Code Into Unix Binaries
  • Immunity CANVAS:

    All students receive a fully licensed copy of Immunity's CANVAS to take home. Immunity's CANVAS makes available hundreds of exploits, many of which are not publicly released. It is an automated exploitation system, and a comprehensive, reliable exploit development framework for penetration testers. CANVAS sells for $1455, and is included in most student quotes. Some restrictions to apply, contact us for details.

    Learn hands-on skills that are difficult to gain in a corporate or government working environment, such as deploying multiple intrusion prevention systems (IPS) and attacking them.
    How You Benefit:
    • Gain the in-demand career skills of a professional security tester. Learn the methodologies, tools, and manual hacking techniques used by penetration testers.
    • Stay ethical! Get hands-on hacking skills in our lab that are difficult to gain in a corporate or government working environment, such as anti-forensics and unauthorized data extraction hacking.
    • Move beyond automated vulnerability scans and simple security testing into the world of ethical penetration testing and hacking.
    • More than interesting theories and lecture, get your hands dirty with hands on lab exercises.
    What's Included:
    • 100 hours over 60 days of Expert Security Training Instruction from a hacking instructor with real-world hacking experience and deep knowledge of course content.
    • Intense Custom Hacking Tools Enterprise Suite, includes every program covered in the course for at home study. (558 Tools). Hacking Tools Enterprise Suite available for individual purchase for only $1,499!
    • Immunity CANVAS Full license
    • Core Impact SEL License
    • Packages that can include exam fees for up to 5 certifications (CEH, CPT, CEPT, ECSA and LPT)
    • Lecture, Lab Exercise and Text book --- Train your ethical friends and co-workers hacking!

    If you are unsure if you meet the required prerequisites, contact us for a quick skill check.

    Click here to get more information about this class!

Select the type of training that best fits your schedule and learning style!

Live, Online, Self-Paced, Classroom - contact us for details on each.


Streaming Only

Base Course. Best for refresher courses

  • Easy Online Access
  • Expert Cisco Instructor
  • Exam Review
  • Highest Quality Content - 90% Pass
  • Self-Paced Training

Mentored Online

Most popular self-pace option.

  • Online & Offline Playback (DVD,mobile)
  • Expert Cisco Instructor
  • Intense Proprietary Exam Prep
  • Highest Quality Content - 90% Pass
  • Self-Paced Mentored Training
  • Mentor & Live Instructor Support
  • Text books, Pre-Study, and Lab books
  • Complex Sims and Exercise Files


Our top rated trainign experience

  • Live Classroom
  • Expert Instructor constantly available
  • Intense Proprietary Exam Prep
  • Highest Quality Content - 90% Pass
  • Self-Paced Training (optional add-on)
  • Extensive Live Instructor Support
  • Our highest pass rate course version
  • Text books, Pre-Study, and Lab books
  • Complex Sims and Exercise Files

Live Online

As close to the classroom from home

  • Live Classroom
  • Expert Instructor constantly available
  • Intense Proprietary Exam Prep
  • Highest Quality Content - 90% Pass
  • Self-Paced Training (optional add-on)
  • Extensive Live Instructor Support
  • Text books, Pre-Study, and Lab books
  • Complex Sims and Exercise Files
  • Workstation running Windows XP SP2 with minimum 1 GB RAM, 30 GB Free Hard Drive Space
  • Windows 2000 Server Install Disk
  • Windows 2003 Server Install Disk
  • High speed internet connection
  • Firm understanding of the Windows Operating System
  • Exposure to the Linux Operating System or other Unix-based OS
  • Grasp of the TCP/IP protocols
  • Desire to learn about the hacking and network security profession, stay ethical, and get great security training!

In Intense School's Penetration Testing Training course, you have the opportunity to test for up to 5 certifications:

  • CEH - Certified Ethical Hacker
  • CPT - Certified Penetration Tester
  • CEPT - Certified Expert Penetration Tester
  • ECSA - EC-Council Certified Security Analyst
  • LPT - Licensed Penetration Tester