Step 1 of 3 - Student Information

Penetration Testing with Kali Linux (PEN-200)

Penetration Testing with Kali Linux (PEN-200)

Purchasing training for your business? Contact our team.

Advanced Web Attacks and Exploitation (WEB-300)

Advanced Web Attacks and Exploitation (WEB-300)

Purchasing training for your business? Contact our team.

Evasion Techniques and Breaching Defenses (PEN-300)

Evasion Techniques and Breaching Defenses (PEN-300)

Purchasing training for your business? Contact our team.

Windows User Mode Exploit Development (EXP-301)

Windows User Mode Exploit Development (EXP-301)

Purchasing training for your business? Contact our team.

MacOS (EXP-312)

MacOS (EXP-312)

Purchasing training for your business? Contact our team.

Security Operations and Defensive Analysis (DEF-200)

Security Operations and Defensive Analysis (SOC-200)

Purchasing training for your business? Contact our team.

Web Attacks with Kali Linux (WEB-200)

Web Attacks with Kali Linux (WEB-200)

Purchasing training for your business? Contact our team.

Click here to obtain a registration code.
What if I don't have a work/university email?

Billing Address

* - Required fields