Ethical Hacking / Penetration Testing Training & Coaching

  • View

  • Download

Embed Size (px)


  • Cyber 51 USA LLC Address: 95 Russell Street, Brooklyn, NYC, 11222, USA

    Web: Email: Phone: (888) 808 7843

    Ethical Hacking / Penetration Testing Coaching Our Penetration Testing and Ethical Hacking Coaching is tailored your personal business needs and individual requirements. Here are your benefits:

    Learn what you really want to learn (Pick the topic approach)

    Little slide shows => hands-on Ethical Hacking!

    1-on-1 Coaching with a Senior Pentester (No videos, no other delegates)

    Delivered Online over GoToMeeting / WebEx at mutual convenience

    On-Site option available at same rate (excl. travel costs)

    Instructors are some of the industrys best Consultants

    Session(s) will be recorded and download will be made available to delegate only

    In English, German or Spanish

    Any Time zone

    Fair per hour billing

    Colleagues of the same business can join at no extra cost Who Should Attend? Our 1-on-1 training is a must for networking professionals, IT Managers and decision-makers that need to understand the threats and security solutions that exist today. Companies and organizations interested in developing greater e-commerce capability need people who know information security.

    Prerequisites A working knowledge of TCP/IP, Linux and Windows. Ideally the delegate has got VMware Player installed on a local machine. We will supply 2 VMware snapshot images to students prior to course starts

    Objectives Our classes will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems.

  • Cyber 51 USA LLC Address: 95 Russell Street, Brooklyn, NYC, 11222, USA

    Web: Email: Phone: (888) 808 7843

    Modular Penetration Testing topics you can choose from: (Every module consists of 2 hours unless otherwise agreed)

    Module 01: Introduction to Ethical Hacking Module 02: Footprinting and Reconnaissance Module 03: Scanning Networks Module 04: Enumeration Module 05: System Hacking Module 06: Trojans and Backdoors Module 07: Viruses and Worms Module 08: Sniffers Module 09: Social Engineering Module 10: Denial of Service Module 11: Session Hijacking Module 12: Hacking Webservers Module 13: Hacking Web Applications Module 14: SQL Injection Module 15: Hacking Wireless Networks Module 16: Hacking Mobile Platforms Module 17: Evading IDS, Firewalls, and Honeypots Module 18: Buffer Overflow Module 19: Cryptography Module 20: Penetration Testing (End-to-End) Module 21: Researching the Dark Web via the TOR Network Module 22: Online Investigations / Background Screening / Online Intelligence Gathering Module 23: Physical Security Module 24: Using Back Track and Kali Linux CONTACT US TODAY!