Advanced Hacking Online: Expert Pen Testing

Our most popular information security and hacking training covers in-depth techniques used by malicious, black-hat hackers with attention grabbing lectures and hands-on lab exercises.

Award Winning Training

For 17 years InfoSec has been one of the most awarded and trusted IT training vendors - 42 industry awards!

Exam Pass Guarantee

We offer peace of mind with our Exam Pass Guarantee for Live Online students.

Analysts Recommended

IDC lists InfoSec Institute as Major Player in their Security Training Vendor Assessment.

Course Overview

Advanced Hacking Online is the online version of the popular Advanced Ethical Hacking course from InfoSec Institute. If you can't get away to attend Advanced Ethical Hacking due to work duties, budget or time constraints, Advanced Hacking Online is a good option to meet your professional development goals.

We've made every effort to replicate the same training experience you would receive in our instructor-led Advanced Ethical Hacking course. InfoSec Institute’s Advanced Hacking Online includes a shipment of software that is loaded onto your computer, which allows you to complete over 20 hours of hands-on lab exercises! Not only do you get high quality instruction from an expert instructor, with InfoSec Institute, you also perform hands-on lab exercises that allow for real knowledge transfer.

Some of the benefits of Advanced Hacking Online are:

Required Prerequisites for full lab participation:

Award Winning Training

InfoSecurity Products Guide 2016 SCAwards2014 2016 Top Training Company ATC of the Year Redmond Reader’s Choice Winner Virtualization

View Pricing

We will never share any of your information, spam you or annoy you with pushy sales pitches.

What You'll Do

Hands on instructor led lab exercises coupled with effective and insightful lectures are the best way to learn advanced penetration testing and ethical hacking skills. In this course, you will get high quality penetration testing training by "learning by doing" in hands-on labs, complemented by expert in class instruction.Some of the instructor-led hands-on lab exercises (we have 18 hacking labs totaling 20+ hours of hands on content):

  • Writing a stack buffer overflow
  • Porting exploits to metasploit modules
  • Find socket shellcode
  • Writing shellcode for Linux
  • Using Ollydbg for Win32 Exploits
  • Using IDA Pro for Reversing
  • Reconstructing sniffed images
  • Reverse engineering Windows PE Binaries
  • Session hijacking
  • Passive Network Analysis
  • Exploitation with a remote GUI
  • Sniffing SSL Encrypted Sessions
  • Format string exploits
  • Heap overflow exploits
  • Windows exploits
  • Calculating offsets
  • Reversing with SoftIce
  • OS determination without touching the target
  • SQL Injection timing attacks
  • Port redirection
  • ASP source disclosure attacks
  • Call-Back Backdoors
  • Encrypted covert channels
  • Remote keyloggers
  • PHP/MySQL SQL Injection
  • Inserting Malicious Code Into Unix Binaries

What You'll Learn

After taking this course, you will walk out the door with the skills to identify and prevent the latest complex and complicated attacks by doing them yourself in our lab with your own two hands. After completing the penetration testing training in this course, you will be at the top 5%-10% in terms of information security knowledge and ethical hacking skills. Some of the topics you will learn to master during the course:

  • Writing buffer overflow exploits
  • dlmalloc Heap Overflow exploits
  • Win32 Heap Overflow exploits
  • Linux stack overflow exploits
  • Defeating non-exec stacks
  • Return-to-libc shellcode
  • Function pointer overwrites
  • Crafting Injectable Shellcode
  • Defeating non-executable stacks
  • Linux LKM Rootkits
  • Windows Kernel Rootkits
  • Reverse engineering training
  • Vulnerability development and discovery
  • Attacking and blinding IDSs
  • Hiding your attacks from IDSs
  • Encrypted covert channels
  • Global Offset Table Overwrites
  • Windows Shellcode
  • Integer Overflows
  • Linux shellcode
  • "no listening port" trojans
  • A whole day on breaking through enterprise DMZs
  • Reconstructing binaries from sniffed traffic
  • Circumventing antivirus
  • Bi-directional Spoofed Communication
  • Session fixation
  • Advanced SQL Injection
  • Defensive techniques

Our Major Clients

FedEx Microsoft Bank of America DISA Symantec

Certifications & Compliance

Prepare for the CPT and CEPT certifications!

Interested in training?

You can register your interest and we’ll keep you up to date when public courses become available. You can also register your interest in on-site training.

Thanks! We’ll keep you updated
As soon as we have news of the status of this course, we’ll be in touch.
  • or call us on (866)-471-0059

We’ve trained over 50,000 happy people

Career Tracks

View instant course pricing

New Exam Pass Guarantee!

Our new Live Online format has produced excellent results. We trust the course quality will help you pass on your first exam attempt and this exam-pass guarantee backs up that trust.