Ethical Hacking / Penetration Testing Training & Coaching
1. ● Cyber 51 USA LLC
● Address: 95 Russell Street, Brooklyn, NYC, 11222, USA
● Web: http://www.cyber51.com ● Email: info@cyber51.com ● Phone: (888) 808 7843
Ethical Hacking / Penetration Testing Coaching
Our Penetration Testing and Ethical Hacking Coaching is tailored your personal business needs and
individual requirements.
Here are your benefits:
Learn what you really want to learn (Pick the topic approach)
Little slide shows => hands-on Ethical Hacking!
1-on-1 Coaching with a Senior Pentester (No videos, no other delegates)
Delivered Online over GoToMeeting / WebEx at mutual convenience
On-Site option available at same rate (excl. travel costs)
Instructors are some of the industry’s best Consultants
Session(s) will be recorded and download will be made available to delegate only
In English, German or Spanish
Any Time zone
Fair per hour billing
Colleagues of the same business can join at no extra cost
Who Should Attend?
Our 1-on-1 training is a must for networking professionals, IT Managers and decision-makers that
need to understand the threats and security solutions that exist today. Companies and organizations
interested in developing greater e-commerce capability need people who know information security.
Prerequisites
A working knowledge of TCP/IP, Linux and Windows. Ideally the delegate has got VMware Player
installed on a local machine. We will supply 2 VMware snapshot images to students prior to course
starts
Objectives
Our classes will immerse the student into an interactive environment where they will be shown how to
scan, test, hack and secure their own systems. The lab intensive environment gives each student in-
depth knowledge and practical experience with the current essential security systems.
2. ● Cyber 51 USA LLC
● Address: 95 Russell Street, Brooklyn, NYC, 11222, USA
● Web: http://www.cyber51.com ● Email: info@cyber51.com ● Phone: (888) 808 7843
Modular Penetration Testing topics you can choose from:
(Every module consists of 2 hours unless otherwise agreed)
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: System Hacking
Module 06: Trojans and Backdoors
Module 07: Viruses and Worms
Module 08: Sniffers
Module 09: Social Engineering
Module 10: Denial of Service
Module 11: Session Hijacking
Module 12: Hacking Webservers
Module 13: Hacking Web Applications
Module 14: SQL Injection
Module 15: Hacking Wireless Networks
Module 16: Hacking Mobile Platforms
Module 17: Evading IDS, Firewalls, and Honeypots
Module 18: Buffer Overflow
Module 19: Cryptography
Module 20: Penetration Testing (End-to-End)
Module 21: Researching the Dark Web via the TOR Network
Module 22: Online Investigations / Background Screening / Online Intelligence Gathering
Module 23: Physical Security
Module 24: Using Back Track and Kali Linux
CONTACT US TODAY!