SlideShare a Scribd company logo
1 of 2
Download to read offline
Cyber	
  51	
  LLC	
  	
  
267	
  Kentlands	
  Blvd.	
  #800,	
  Gaithersburg,	
  Maryland,	
  20878,	
  USA	
  
Email:	
  info@cyber51.com	
  	
  Phone:	
  (301)	
  830-­‐6702	
  
2 Day Penetration Testing for Beginners
Ethical Hacking is employing the same methods a malicious hacker would in order to test security of
your own systems and then mitigate the loopholes found.
Who Should Attend?
The 2 Day Penetration Testing and Ethical Hacking training is a must for networking professionals, IT
Managers and decision-makers that need to understand the threats and security solutions that exist
today. Companies and organizations interested in developing greater e-commerce capability need
people who know information security.
Prerequisites
A working knowledge of TCP/IP, Linux and Windows.
VMware Player with a copy of Kali Linux
Objectives
Our classes will immerse the student into an interactive environment where they will be shown how to
scan, test, hack and secure their own systems. The lab intensive environment gives each student in-
depth knowledge and practical experience with the current essential security systems.
Course Content
Day 1
Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
System Hacking & Exploits
Sniffers
Day 2
Social Engineering (brief overview)
Denial of Service
Session Hijacking
Hacking Webservers and Applications
XSS and SQL injection overview
Hacking Wireless (brief overview)
Cyber	
  51	
  LLC	
  	
  
267	
  Kentlands	
  Blvd.	
  #800,	
  Gaithersburg,	
  Maryland,	
  20878,	
  USA	
  
Email:	
  info@cyber51.com	
  	
  Phone:	
  (301)	
  830-­‐6702	
  
Pricing and Location
Price:
$997.00 USD per delegate (scheduled) or $1,600.00 / day + T&E when delivered in-house
What will you learn?
See The World from a Hackers perspective
Learn Ethical Hacking
Get to Know The Tools Hackers use
Use that Knowledge to Secure Your Systems!
Start Or Enhance Your Career in IT Security
Earn respect amongst colleagues
Get trained by some of the best Consultants
Why Train with us?
We offer a unique Penetration Testing and Ethical Hacking Coaching program, which is very different
from anything else out there.
Your Benefits:
No death by PowerPoint slides => hands-on Ethical Hacking!
Small groups delegates per training to maximize time for questions
In-House option available for businesses. Contact us!
Instructors are some of the industry’s best Consultants, not just instructors.
Important Note: We will make every delegate sign an NDA & Confidentiality agreement prior to the
start of the training. This is necessary so that delegates to do not abuse the knowledge gathered in
our Ethical Hacking Training. Any knowledge acquired is intended to be used for legal purposes only
and you will be held fully responsible for any wrong-doing.
Please also note, that we may do a background check on delegates prior to attending and may share
delegate information with the US police and/or other US government bodies if requested.We also
reserve the right to decline delegates from attending with no reasons given, if we suspect the
delegate’s intention to be malicious. We are teaching people to become Ethical Hackers and not
Cyber Criminals.
Our Pentest Training is for study and education purposes only and we cannot be held responsible for
any damage caused by improper use of the tools and methods described. It is illegal in most countries
to perform penetration tests without a written prior agreement of the network/system owner. Hacking
carries severe penalties.

More Related Content

What's hot

White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...Intellipaat
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hackingNigam Dave
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory RealmShawn Tuma
 
Ethical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth VasavadaEthical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth VasavadaKrutarth Vasavada
 
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...Edureka!
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Simplilearn
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSSifs India
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportRaghav Bisht
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentationteriwoja
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hackingSunny Sundeep
 

What's hot (20)

White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Lesson plan ethical hacking
Lesson plan  ethical hackingLesson plan  ethical hacking
Lesson plan ethical hacking
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth VasavadaEthical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth Vasavada
 
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
 
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
Ethical Hacking Certifications | Certified Ethical Hacker | Ethical Hacking |...
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFS
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hackers
HackersHackers
Hackers
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
 
Hackers ethics presentation
Hackers ethics presentationHackers ethics presentation
Hackers ethics presentation
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Similar to 10. penetration-testing-training-for-beginners-cyber51

Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxNarangYadav
 
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptxCCNMumbai
 
5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical Hacking5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical HackingKoenig Solutions Ltd.
 
Learn Why to Hire Certified Ethical Hackers USA.pptx
Learn Why to Hire Certified Ethical Hackers USA.pptxLearn Why to Hire Certified Ethical Hackers USA.pptx
Learn Why to Hire Certified Ethical Hackers USA.pptxTekkis
 
LSET’s GUIDE FOR ETHICAL HACKING
LSET’s GUIDE FOR ETHICAL HACKINGLSET’s GUIDE FOR ETHICAL HACKING
LSET’s GUIDE FOR ETHICAL HACKINGActonRoy
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfuzair
 
Ethical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruaryEthical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruarySkillogic Solutions
 
Ethical Hacking Course in Hyderabad January
Ethical Hacking Course in Hyderabad JanuaryEthical Hacking Course in Hyderabad January
Ethical Hacking Course in Hyderabad JanuarySkillogic Solutions
 
Ethical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruaryEthical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruarySkillogic Solutions
 
Ethical Hacking Course in Hyderabad March.pptx
Ethical Hacking Course in Hyderabad March.pptxEthical Hacking Course in Hyderabad March.pptx
Ethical Hacking Course in Hyderabad March.pptxSkillogic Solutions
 
Ethical Hacking Course in Chennai January
Ethical Hacking Course in Chennai JanuaryEthical Hacking Course in Chennai January
Ethical Hacking Course in Chennai JanuarySkillogic Solutions
 
Ethical Hacking Course in Chennai February 2024
Ethical Hacking Course in Chennai February 2024Ethical Hacking Course in Chennai February 2024
Ethical Hacking Course in Chennai February 2024Skillogic Solutions
 
Ethical Hacking Course in Chennai March 2024
Ethical Hacking Course in Chennai March 2024Ethical Hacking Course in Chennai March 2024
Ethical Hacking Course in Chennai March 2024Skillogic Solutions
 
Ethical Hacking Course in Chennai February
Ethical Hacking Course in Chennai FebruaryEthical Hacking Course in Chennai February
Ethical Hacking Course in Chennai FebruarySkillogic Solutions
 
Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024Skillogic Solutions
 
Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024Skillogic Solutions
 
Ethical Hacking Course in Pune March 2024
Ethical Hacking Course in Pune March 2024Ethical Hacking Course in Pune March 2024
Ethical Hacking Course in Pune March 2024Skillogic Solutions
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfJawaidAbdulHameed
 
Ethical Hacking Course in Bangalore February 2024
Ethical Hacking Course in Bangalore February 2024Ethical Hacking Course in Bangalore February 2024
Ethical Hacking Course in Bangalore February 2024Skillogic Solutions
 

Similar to 10. penetration-testing-training-for-beginners-cyber51 (20)

Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptx
 
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
7 Ultimate Benefits Of Ethical Hacking Course To Boost Your IT Career.pptx
 
5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical Hacking5 Things You Should Know About Ethical Hacking
5 Things You Should Know About Ethical Hacking
 
20. CYBER51-1PAGE-FLYER-FEB15
20. CYBER51-1PAGE-FLYER-FEB1520. CYBER51-1PAGE-FLYER-FEB15
20. CYBER51-1PAGE-FLYER-FEB15
 
Learn Why to Hire Certified Ethical Hackers USA.pptx
Learn Why to Hire Certified Ethical Hackers USA.pptxLearn Why to Hire Certified Ethical Hackers USA.pptx
Learn Why to Hire Certified Ethical Hackers USA.pptx
 
LSET’s GUIDE FOR ETHICAL HACKING
LSET’s GUIDE FOR ETHICAL HACKINGLSET’s GUIDE FOR ETHICAL HACKING
LSET’s GUIDE FOR ETHICAL HACKING
 
A Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdfA Beginner’s Guide to Ethical Hacking.pdf
A Beginner’s Guide to Ethical Hacking.pdf
 
Ethical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruaryEthical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad February
 
Ethical Hacking Course in Hyderabad January
Ethical Hacking Course in Hyderabad JanuaryEthical Hacking Course in Hyderabad January
Ethical Hacking Course in Hyderabad January
 
Ethical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad FebruaryEthical Hacking Course in Hyderabad February
Ethical Hacking Course in Hyderabad February
 
Ethical Hacking Course in Hyderabad March.pptx
Ethical Hacking Course in Hyderabad March.pptxEthical Hacking Course in Hyderabad March.pptx
Ethical Hacking Course in Hyderabad March.pptx
 
Ethical Hacking Course in Chennai January
Ethical Hacking Course in Chennai JanuaryEthical Hacking Course in Chennai January
Ethical Hacking Course in Chennai January
 
Ethical Hacking Course in Chennai February 2024
Ethical Hacking Course in Chennai February 2024Ethical Hacking Course in Chennai February 2024
Ethical Hacking Course in Chennai February 2024
 
Ethical Hacking Course in Chennai March 2024
Ethical Hacking Course in Chennai March 2024Ethical Hacking Course in Chennai March 2024
Ethical Hacking Course in Chennai March 2024
 
Ethical Hacking Course in Chennai February
Ethical Hacking Course in Chennai FebruaryEthical Hacking Course in Chennai February
Ethical Hacking Course in Chennai February
 
Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024Ethical Hacking Course in Pune February 2024
Ethical Hacking Course in Pune February 2024
 
Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024Ethical Hacking Course in Pune January 2024
Ethical Hacking Course in Pune January 2024
 
Ethical Hacking Course in Pune March 2024
Ethical Hacking Course in Pune March 2024Ethical Hacking Course in Pune March 2024
Ethical Hacking Course in Pune March 2024
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdf
 
Ethical Hacking Course in Bangalore February 2024
Ethical Hacking Course in Bangalore February 2024Ethical Hacking Course in Bangalore February 2024
Ethical Hacking Course in Bangalore February 2024
 

10. penetration-testing-training-for-beginners-cyber51

  • 1. Cyber  51  LLC     267  Kentlands  Blvd.  #800,  Gaithersburg,  Maryland,  20878,  USA   Email:  info@cyber51.com    Phone:  (301)  830-­‐6702   2 Day Penetration Testing for Beginners Ethical Hacking is employing the same methods a malicious hacker would in order to test security of your own systems and then mitigate the loopholes found. Who Should Attend? The 2 Day Penetration Testing and Ethical Hacking training is a must for networking professionals, IT Managers and decision-makers that need to understand the threats and security solutions that exist today. Companies and organizations interested in developing greater e-commerce capability need people who know information security. Prerequisites A working knowledge of TCP/IP, Linux and Windows. VMware Player with a copy of Kali Linux Objectives Our classes will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in- depth knowledge and practical experience with the current essential security systems. Course Content Day 1 Introduction to Ethical Hacking Footprinting and Reconnaissance Scanning Networks Enumeration System Hacking & Exploits Sniffers Day 2 Social Engineering (brief overview) Denial of Service Session Hijacking Hacking Webservers and Applications XSS and SQL injection overview Hacking Wireless (brief overview)
  • 2. Cyber  51  LLC     267  Kentlands  Blvd.  #800,  Gaithersburg,  Maryland,  20878,  USA   Email:  info@cyber51.com    Phone:  (301)  830-­‐6702   Pricing and Location Price: $997.00 USD per delegate (scheduled) or $1,600.00 / day + T&E when delivered in-house What will you learn? See The World from a Hackers perspective Learn Ethical Hacking Get to Know The Tools Hackers use Use that Knowledge to Secure Your Systems! Start Or Enhance Your Career in IT Security Earn respect amongst colleagues Get trained by some of the best Consultants Why Train with us? We offer a unique Penetration Testing and Ethical Hacking Coaching program, which is very different from anything else out there. Your Benefits: No death by PowerPoint slides => hands-on Ethical Hacking! Small groups delegates per training to maximize time for questions In-House option available for businesses. Contact us! Instructors are some of the industry’s best Consultants, not just instructors. Important Note: We will make every delegate sign an NDA & Confidentiality agreement prior to the start of the training. This is necessary so that delegates to do not abuse the knowledge gathered in our Ethical Hacking Training. Any knowledge acquired is intended to be used for legal purposes only and you will be held fully responsible for any wrong-doing. Please also note, that we may do a background check on delegates prior to attending and may share delegate information with the US police and/or other US government bodies if requested.We also reserve the right to decline delegates from attending with no reasons given, if we suspect the delegate’s intention to be malicious. We are teaching people to become Ethical Hackers and not Cyber Criminals. Our Pentest Training is for study and education purposes only and we cannot be held responsible for any damage caused by improper use of the tools and methods described. It is illegal in most countries to perform penetration tests without a written prior agreement of the network/system owner. Hacking carries severe penalties.