
PEN 500 Pentesting & Network Exploitation
Course Overview Pentesting & Network Exploitation exposes students to all manner of reconnaissance, scanning, enumeration, exploitation and pillaging for 802.3 networks. Topics expose students to a variety of recon, discovery, scanning, enumeration, exploitation, postexploitation, pillaging, covering one’s tracks and persistence. Objectives Provide in-depth exposure and hands-on practice with all facets of 802.3 hacking, vulnerability research, pivoting, exploitation, password/hash cracking, post-exploitation pillaging and methods of setting up persistence on a victim’s network Target Audience Penetration testers looking to broaden their overall penetration testing skill set, network engineers, system administrators, developers Estimated Course Length: 24 hours Day 1 Day 1 introduces students to host target analysis. Topics include Linux command line, bash scripting and simple programming to enumerate, attack and exploit Linux hosts later in the course. Once Linux is complete