InfoSec Institute
| About UsSecurity Training CoursesTraining Delivery Options | Why Choose InfoSec? | Contact Us |  
Small Class Size
Hands On Security Training
Cutting-Edge Course Content
Satisfaction Guarantee
World Renown Instructors
Boot Camp Style Training
Luxury Accommodations

Enterprise Security Awareness:

 
Security Awareness for IT Users
Security Awareness for IT Pros
Security Awareness for Software Developers

Hands-On Security Training:

 
Ethical Hacking
Advanced Ethical Hacking
Penetration Testing - 10 Day
Intrusion Prevention
Computer Forensics Training
Advanced Computer Forensics
Data Recovery Training
Security Architecture Design
Application Security
SCADA Security
Reverse Engineering Training
Information Security Training
DIACAP Training
Incident Response and Network Forensics
VOIP Security Course
Wireless Security Training
On-Site Training

Certification Preparation Training:

 
CEH Boot Camp
CISSP Boot Camp
CISA Boot Camp
CISM Boot Camp
ECSA/LPT Boot Camp
Security+ Boot Camp
On-Site Training

Online Professional Development:

 
Hacker Training Online
Advanced Hacking Online
Penetration Testing Online
Intrusion Prevention Online
Reverse Engineering Online
Computer Forensics Online
SCADA Security Online
Data Recovery Online
Security Architecture Online
Application Security Online
CISSP Boot Camp Online
CISM Boot Camp Online
CISA Boot Camp Online


Small Class Size
Bring a Friend Discount
Hands-On Instruction
World Renown Instructors


  Ask a Technical Student Coordinator A Question

Name: Business Phone No: Email:  Ask a Student Coordinator a Question: 
 

Certified Expert Penetration Tester (CEPT)

  • The CEPT certification is designed to certify that individuals have expert level knowledge and skills in relation to penetration testing
  • Consists of 9 domains directly relating to penetration testing
  • 100 Questions - 80% required to pass
  • Exam given On-Site during course with immediate computer graded results

9 Certified Expert Penetration Tester (CEPT) Domains:

  • Penetration Testing Methodologies
  • Network Attacks
  • Network Recon
  • Shellcode
  • Reverse Engineering
  • Memory Corruption/Buffer Overflow Vulnerabilities
  • Exploit Creation - Windows Architecture
  • Exploit Creation - Linux/Unix Architecture
  • Web Application Vulnerabilities

  Ask a Technical Student Coordinator A Question

Name: Business Phone No: Email:  Ask a Student Coordinator a Question: