Introduction to Penetration Testing

Course Description

This lab-based course will provide students with an understanding of the threat vectors and exploitation techniques used to penetrate systems and networks. As businesses become more dependent on interconnected systems for survival, they recognize a need to train their own personnel in assessment, exploitation and remediation techniques. These “red teams” are becoming vital to organizations, exposing vulnerabilities early, implementing remediation procedures and continually assessing the effectiveness of security strategies with an ever-changing threat landscape.

Course ID: DEF 4606P
Course Format: Classroom

Available Classroom Sections

Start Date End Date Registration Deadline Format Location Cost CRN
Section Details Apr 17, 2018 Apr 19, 2018 Apr 17, 2018 Classroom Atlanta, GA $1,895 18267
View previous sections
View Previous Sections
CRN Start date End date Format Location Cost
15215 Apr 14, 2015 Apr 16, 2015 Classroom Atlanta, GA $1,895
16065 Apr 19, 2016 Apr 21, 2016 Classroom Atlanta, GA $1,895
17025 Apr 18, 2017 Apr 20, 2017 Classroom Atlanta, GA $1,895

Special Discounts

GTRI employees are eligible for a discount on this course.  If you are a GTRI employee, please go to https://webwise.gtri.gatech.edu/talent-management/organizational-development and look under “GT Professional Development” for a coupon code to use when checking out.

Note: Coupon codes must be applied during checkout and cannot be redeemed after your checkout is complete. Only one coupon code can be used per shopping cart.

Prerequisites

This is an intensive hands-on lab. Familiarity with basic command-line tools, Windows, and Linux is necessary to get the most out of the class.

Who Should Attend

Information security personnel tasked with the defense of critical systems, networks, and infrastructure, system administrators and advanced programmers, web developers, and database administrators

How You Will Benefit

  • Gain understanding of the threat vectors and exploitations used to penetrate products and networks
  • Explore both classic and modern attacks and impacts
  • Define the penetration testing process: domain definition, exploitation, impact assessment, remediation cycle
  • Explore tools and techniques for exploiting vulnerabilities and assessing impact
  • Determine effective remediation strategies
  • Socialize penetration testing and assessment results
  • Create a culture of security throughout an organization

Content

  • Penetration testing cycle: Reconnaissance, exploitation, impact assessment, remediation
  • Social engineering attacks and impacts
  • Discovery of tools and techniques used for exploiting vulnerabilities and assessing impact
  • Network enumeration
  • Web applications assessment
  • Effective remediation strategies
  • Socialize penetration testing and assessment results
  • Creating a culture of security throughout an organization

For Course-Related Questions

Please contact the course administrator: Renita Folds