Voice Search
Voice Search

Penetration Testing Training: Tools and Techniques - LiveOnline


Rated 9.3 out of 10 based on over 6784 reviews

Free course advice
Learn more about how we use your data

What is the Penetration Testing Training: Tools and Techniques course?

Penetration testing (or ethical hacking, as it’s often called) is the process of testing computer systems, website applications and networks to find security vulnerabilities, which an attacker may be able to exploit.

Throughout this Penetration Testing training course, you’ll learn exactly how hackers compromise operating systems, and how they’re able to evade antivirus software. You’ll gain the skills required to discover weaknesses within your own network, by using methods which hackers would be using. Finally, you’ll acquire the skills needed to test and exploit your organisations defences and implement countermeasures to minimise the risk to your company.

Available delivery methods for this course
Group booking

Group booking

Live Online


Key features of the course

  • Delivery Method: Classroom
  • Exam: Included
  • Duration: 4 Days

Browse classroom dates below






Location Date Duration Price Availability
Live OnlineJul 7th 2020  4 Days£1,995 ex. VATAvailable
Enquire now
Book now
Live OnlineAug 18th 2020  4 Days£1,995 ex. VATAvailable
Enquire now
Book now
User dates are subject to availability and change

Who is the course suitable for?

Is the Penetration Testing Training: Tools and Techniques course right for me?

Prerequisites for this course include:

  • Experience with security issues at the level of:
    • System and Network Security Introduction, or
    • CompTIA Security+ Certification Exam Preparation
  • Knowledge in TCP/IP concepts

Why Choose e-Careers?

e-Careers has partnered with The Learning Tree, to offer a range of courses, delivered via high-tech classrooms or virtual learning, depending on your requirement.

We are an award-winning, established eLearning course provider, with over 16 years’ experience in the industry.  We offer high-quality training courses at competitive prices.

What will I learn on this course?

Throughout this course you’ll learn how to deploy ethical hacking, with the purpose of exposing weaknesses within your organisation. Learn how to gather intelligence by employing reconnaissance, scanning tools and published data. Gain hands-on experience testing and improving your security, by using hacking tools to compromise your network. Finally, learn to protect against privilege escalation in order to prevent intrusions.

Module 1 – Introduction to Ethical Hacking

  • Defining a penetration testing methodology
  • Creating a security testing plan

Module 2 - Footprinting and Intelligence Gathering

  • Acquiring target information
    • Locating useful and relevant information
    • Scavenging published data
    • Mining archive sites
  • Scanning and enumerating resources
    • Identifying authentication methods
    • Harvesting e–mail information
    • Interrogating network services
    • Scanning from the inside out with HTML and egress busting

Module 3 - Identifying Vulnerabilities

  • Correlating weaknesses and exploits
    • Researching databases
    • Determining target configuration
    • Evaluating vulnerability assessment tools
  • Leveraging opportunities for attack
    • Discovering exploit resources
    • Attacking with Metasploit

Module 4 – Attacking Servers and Devices to Build Better Defences

  • Bypassing router Access Control Lists (ACLs)
    • Discovering filtered ports
    • Manipulating ports to gain access
    • Connecting to blocked services
  • Compromising operating systems
    • Examining Windows protection modes
    • Analysing Linux/UNIX processes
  • Subverting web applications
    • Injecting SQL and HTML code
    • Hijacking web sessions by prediction and Cross–Site Scripting (XSS)
    • Bypassing authentication mechanisms

Module 5 – Manipulating Clients to Uncover Internal Threats

  • Baiting and snaring inside users
    • Executing client–side attacks
    • Gaining control of browsers
  • Manipulating internal clients
    • Harvesting client information
    • Enumerating internal data
  • Deploying the social engineering toolkit
    • Cloning a legitimate site
    • Diverting clients by poisoning DNS

Module 6 – Exploiting Targets to Increase Security

  • Initiating remote shells
    • Selecting reverse or bind shells
    • Leveraging the Metasploit Meterpreter
  • Pivoting and island–hopping
    • Deploying portable media attacks
    • Routing through compromised clients
  • Pilfering target information
    • Stealing password hashes
    • Extracting infrastructure routing, DNS and NetBIOS data
  • Uploading and executing payloads
    • Controlling memory processes
    • Utilising the remote file system

Module 7 – Testing Antivirus and IDS Security

  • Masquerading network traffic
    • Obfuscating vectors and payloads
    • Side–stepping perimeter defences
  • Evading antivirus systems
    • Discovering stealth techniques to inject malware
    • Uncovering the gaps in antivirus protection

Module 8 - Mitigating Risks and Next Steps

  • Reporting results and creating an action plan
    • Managing patches and configurations
    • Recommending cyber security countermeasures

LiveOnline Learning

Currently, 25% of all classes are delivered through LiveOnline, so if you can’t make it to our London, Euston location for any reason, this option is the ideal solution for you. You’ll also be happy to note that the pass marks are the same for both classroom and LiveOnline delegates.

To ensure you have enough time to familiarise yourself with the text you'll be studying, we send out any manuals and course reading materials to you around 3-5 weeks before your course commences. You’ll also gain access to the trainer for one hour (available after course, via phone or skype). 

Each of our classes are equipped with high technology to be able to successfully deliver courses through LiveOnline, including:

  • Wide screen cameras – Delivering clear visibility of both the class and the trainer
  • Projector and whiteboard – Materials are projected onto a full white wall
  • Latest annotation hardware and software – Providing greater visibility for your LiveOnline screen
  • Electronic Mat – Each trainer has access to an electronic mat, which when stood on and off switches camera angles between their face and the whiteboard, helping to provide a better visible learning experience
  • Microphones - All trainers have a microphone so the whole class (and especially the LiveOnline learners) can better hear the trainers loud and clear. LiveOnline delegates will require a microphone headset. Classroom attendees will have access to a microphone (one per desk of two delegates) and speaker system. When questions arise, everyone can both speak and hear clearly

Softskills courses which require breakout sessions in small groups, also involve the LiveOnline delegate, through a shared screen and camera, with full visibility and microphone access. This ensures each delegate (both in the classroom and external locations via LiveOnline) has the opportunity to be involved in the interactive lessons. 

If LiveOnline delegates experience any technical difficulties or questions, there is a fully managed control centre, who will assist each delegate. Response times sit at 45 seconds and each session is constantly monitored by a technical team.

Prices include all training, manuals, pre-course reading material, exams and 1 hour one-one access to the trainer).

We’re trusted by

Individuals, small businesses and large corporations who have used e-Careers since 2001. Here are some names you’ll recognise:

Saatchi & Saatchi
American Express

Do you know someone who’d love this course? Tell them about it...