Cracking The Perimeter Online Security Training
Our Cracking The Perimeter (CTP) online security course combines a unique blend of penetration testing skills for one purpose: how to bypass security. The field of pentesting is constantly evolving. Both security awareness training and more secure technologies are on the rise. The bar required to “crack” the organizational perimeter is constantly being raised. Public exploits and weak passwords rarely do the job, which requires the attacker to have an expanded set of advanced hacking techniques in order to successfully complete a real-world pentest.
In the CTP course, we will examine several advanced attack vectors, and how to bypass security settings based on real world scenarios we have encountered from our pentest engagements. In addition, we will cover some “special features” of Kali Linux designed to save you time and effort.
Topics such as cross-site scripting, directory traversal, anti-virus avoidance, how to manually obfuscate shellcode, and much more will be covered in a high-level of detail. Students will learn how to combine imaginative thinking and ethical hacking techniques with their own customized attack vectors to bypass security of their targeted systems. Cracking The Perimeter is among the most challenging ethical hacking and pentesting courses of its type.