Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Shadowscape
  4. Penetration Testing Essentials (RED-I)

Penetration Testing Essentials (RED-I)

Ethical hacking is a fairly broad concept with penetration testing being at the forefront as a necessary security measure that aims to test current network defense capabilities. "Pen Tests" are required for compliance and security testing and make up a subset of ethical hacking, traversing a line between adversarial emulation and using toolsets that are relatively inert in their threat to a network but represent a targeted skillset nonetheless. Many of the tools that Pen Testers use are highly specialized and carry with them the ability to conduct actual damage if in the hands of an untrained hacker. This course aims to serve as an introductory course to offensive security operations with emphasis in beginner to intermediate ethical hacking tools and concepts.

Provider Information

More courses from this provider:
Contact Information

Shadowscape
802 W. Bannock St.
Suite 1005
Boise, ID 83702

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Prerequisites

Cybersecurity Essentials (SEC-I) and NET-I or equivalent strongly recommended.

Training Purpose
Skill Development
Specific Audience
All
Federal Employee
Academia
Contractor
Delivery Method
Online, Instructor-Led
Online, Self-Paced
  • Online, Instructor-Led
  • Online, Self-Paced

Learning Objectives

This course will teach students the concepts of Open-Source Intelligence (OSINT)/reconnaissance, scanning and network enumeration and subsequent target exploitation, password attacking and much more, using industry standard techniques, tools and procedures. Through expert instruction and hands-on practical application exercises, students will be introduced to the complete, professional penetration testing methodology that is required of a professional ethical hacker from start to finish. This course seeks to introduce students to a multitude of options available when conducting a pen test to ensure that students are able to pivot when confronted with a certain challenge. Students will further be given a complete report writing period of instruction to cap off the effort and be able to put their newfound skills to the test in a penetration testing culmination exercise.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: