1-800-460-5597 (US & Canada)
Bachelor's and Certificate Admissions
The Penetration Testing course utilizes a cloud-based laboratory environment. The virtual lab is accessed through a cloud-service provider, Skytap. In order to complete the labs, please ensure the computer you use for this course can connect to the Skytap lab. To test your connectivity with Skytap, please visit https://cloud.skytap.com/tools/connectivity.
Additionally, synchronous course lectures are given once a week for a two-hour period through a Webex session. Please plan your schedule accordingly to ensure attendance at the weekly lectures.
The focus is on the use of open source tools, especially the Metasploit Framework. Specific tools used in the course include: BackTrack, Nmap, Wireshark, Metasploit, Vistumbler, BurpSuite, Nessus, Cain and Abel, Nikto, Aircrack-ng Suite, John the Ripper, SET (Social Engineer Toolkit)
Topic areas covered in Penetration Testing I include:
Topic areas covered in Penetration Testing II include:
Students will need to purchase their own textbooks for this course. The following textbooks will be used: Metasploit: