March – Saturday Network Penetration Testing in Maryland
The primary focus of the class is getting the student comfortable with tools and tactics used in modern network pentesting. The class will be focused ‘goal oriented pentesting’, […]
I was asked by some students to spend some time covering the basics of Linux so that it can be used for IT Security tasks. This will be a 1 day ONLINE workshop for $25.
Metasploit has become the defacto standard for pentesting today. Most security professionals have some familiarity with it, but few can REALLY get in and drive it like a pro.
Take your Metasploit skills to the next […]
A lot of people signed up for the Pentest Candidate Program and I’m really happy about that (I obviously didn’t think that many people would signup). I’ve had a few people ask me about doing […]
Penetration Tester Job Description
A penetration tester or ethical hacker is a type of security consultant that tries to find and exploit vulnerabilities/misconfigurations in order to break into computer systems and software. They then document the […]
You know I love Python – if you are an IT Security person with very little programming experience then this class is for you. Python for IT Security Professionals is the perfect course to get […]
You aren’t going to want to miss this one! This weekend bootcamp is going to cover a lot of material.
We will be covering:
Saturday10am EST – 4pm EST
Nmap NSE Scripting (using and writing your own NSE […]
Hacking with Powershell Workshop
The simple fact is if you are going to be pentesting modern environments with newer operating systems (Windows 7, Windows 8, Server 2008, Server 2012) – you need Powershell!
There is no getting […]
Wanna write your own exploits? It’s not as hard as you think!
I am doing a make up class for some students that signed up for the Exploit Dev weekend workshop a few months ago. We […]
This is a beginner’s functional programming course focused on programming concepts that can be used to accomplish common security tasks such as log parsing, password cracking, port scanning, vulnerability testing, web application security testing, malware […]