Shopping Cart

No products in the cart.

Introduction to Pentesting with John Strand

Introduction to Pentesting with John Strand

Overview

  • Course Length: 16 hours
  • Support from expert instructors
  • Includes a certificate of completion
  • 12 months access to Cyber Range
Instructor:

In this training course, we will examine the different types of penetration testing engagements and take a deep dive into establishing a repeatable testing methodology for executing quality tests.

Are you looking to make a transition into pentesting but are overwhelmed or just don’t know how to get started? With numerous different types of engagements, operational phases, and a constant flood of new vulnerabilities hitting the industry, the journey into penetration testing can quickly become confusing.

We will look at some tools of the trade to understand what they are doing under the hood, identify what separates a great finding from a good finding in reports, and really zero in on establishing your own methodology!

By the end of the training, you can expect to leave with a firm understanding of how pentests are executed and a newfound comfortability performing penetration tests. We will also provide numerous resources and tools that will help you pave your way into a pentesting career!

Wild West Hackin’ Fest at Mile High (Feb 4th – Feb 5th, 2025) – Denver, CO

  • February 4th – 8:30 AM to 5:00 PM MDT
  • February 5th – 8:30 AM to 5:00 PM MDT

Key Takeaways

  • Deep dive into different pentesting engagement types
  • A solid methodology for executing pentests
  • An introduction to numerous pentesting tools and resources
  • Hands-on practice
  • Guidance with transitioning into a pentesting career

Who Should Take This Course

  • People wanting to get started in pentesting
  • Anyone with an inquisitive thought process
  • Companies hiring pentest firms or executing in-house pentests
  • People comfortable with information technology
  • Software developers, System admins, Database admins, Network engineers
  • Helpdesk and IT support

Audience Skill Level

This course was prepared with everyone in mind, but students who have a basic understanding of information technology, applications, or computer networks will likely feel comfortable with the content.

What Students Will Be Provided With

  • Course slides
  • Virtual machine with pre-installed tools
  • Resources and tools with instructions
  • Stable Internet access
  • x86 architecture CPU clocked at 2 GHz or higher that is capable of nested virtualization
    (Apple Silicon is currently not supported)
  • A computer with at least 8 GB of RAM. 16 GB is recommended
  • VMWare Workstation or VMWare Fusion
    (VirtualBox and other VM software is not supported)
  • Windows 10/11, MacOSX+, or a currently supported Linux Distribution 
  • Full Administrator/root access to your computer or laptop

This class is being taught at Wild West Hackin’ Fest at Mile High 2025.

For more information about our conferences, visit Wild West Hackin’ Fest!

Clicking on the button above will take you
to our registration page on the website.

On Demand Training

  • Train at your own pace with no set course schedule
  • Access to all course resources, including slides and VMs
  • Subject Matter Expert support through Discord
  • Tips, tools, and techniques that can be applied immediately upon returning to work
  • Strengthen your skills by solving challenges within the Antisyphon Cyber Range
  • Become part of a community driven to educate and share knowledge
Choose an access term

$575.00

$575.00

Course Categories:

Fundamentals, Pentesting, Red Team