Penetration Testing – 10 Day Boot Camp

Infosec’s Penetration Testing training — delivered in the form of a 10-day, boot-camp style course — is the information security industry’s most comprehensive penetration testing course available.

Award-Winning Training

For 15 years InfoSec has been one of the most awarded and trusted information security training vendors — 40+ industry awards!

Exam Pass Guarantee

We offer peace of mind with our Exam Pass Guarantee for Flex Pro students.

Hands-On Training

Practice each evening on "Live Cases," investigating data from real forensics cases and preparing reports on findings.

Expert Penetration Testing Course Overview

Infosec’s Penetration Testing training — delivered in the form of a 10-day, boot-camp style course — is the information security industry’s most comprehensive penetration testing course available. You will learn everything there is to know about penetration testing, from the use of network reconnaissance tools to the writing of custom zero-day buffer overflow exploits. The goal of this course is to help you master a repeatable, documentable penetration testing methodology that can be used in an ethical penetration testing or hacking situation. This penetration testing training course has a significant return on investment: you walk out the door with hacking skills that are highly in demand, as well as up to four certifications: CEH, Pentest+ CPT and the CEPT!


  • Gain the in-demand career skills of a professional security tester. Learn the methodologies, tools, and manual hacking techniques used by penetration testers.
  • Stay ethical! Get hands-on hacking skills in our lab that are difficult to gain in a corporate or government working environment, such as anti-forensics and unauthorized data extraction hacking.
  • Move beyond automated vulnerability scans and simple security testing into the world of ethical penetration testing and hacking.
  • More than interesting theories and lecture, get your hands dirty in our dedicated hacking lab in this network security training course.

After Infosec’s Penetration Testing training course, you will be prepared to take (and pass) up to 4 certifications:

  • CEH – Certified Ethical Hacker
  • CompTIA Pentest+
  • CPT – Certified Penetration Tester
  • CEPT – Certified Expert Penetration Tester


  • Firm understanding of the Windows Operating System
  • Exposure to the Linux Operating System or other Unix-based OS
  • Firm understanding of the TCP/IP protocols.
  • Exposure to network reconnaissance and associated tools (nmap, nessus, netcat)
  • Programming knowledge is NOT required
  • Desire to learn about Ethical Hacking, and get great penetration testing training!

Award-winning training that you can trust.

High Performer

Technical Skills Development Software

Outstanding Partnership Award

Gold Winner

Best Cybersecurity Education Provider

Publisher's Choice

Security Training for Infosec Professionals

Top 20 Company

IT Training

The Most Flexible Training — Guaranteed

Exam Pass Guarantee — If you don’t pass your exam on the first attempt, get a second attempt for free; includes the ability to re-sit the course for free for up to one year

100% Satisfaction Guarantee — If you’re not 100% satisfied with your training at the end of the first day, you may enroll in a different Flex Pro or Flex Classroom course

Knowledge Transfer Guarantee — If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year

Our Major Clients

What You'll Learn

    • Writing buffer overflow exploits
    • dlmalloc Heap Overflow exploits
    • Win32 Heap Overflow exploits
    • Linux stack overflow exploits
    • Defeating non-exec stacks
    • Return-to-libc shellcode
    • Function pointer overwrites
    • Crafting Injectable Shellcode
    • Defeating non-executable stacks
    • Linux LKM Rootkits
    • Windows Kernel Rootkits
    • Reverse engineering training
    • Vulnerability development and discovery
    • Attacking and blinding IDSs
    • Hiding your attacks from IDSs
    • Encrypted covert channels
    • Global Offset Table Overwrites
    • Windows Shellcode
    • Integer Overflows
    • Linux shellcode
    • “no listening port” trojans
    • A whole day on breaking through enterprise DMZs
    • Reconstructing binaries from sniffed traffic
    • Circumventing antivirus
    • Bi-directional Spoofed Communication
    • Session fixation
    • Advanced SQL Injection
    • Justifying a penetration test to management and customers
    • Defensive techniques

    Hands-On Activities

      • Capture the Flag exercises every night!
      • Writing a stack buffer overflow
      • Porting exploits to metasploit modules
      • Find socket shellcode
      • Writing shellcode for Linux
      • Using Ollydbg for Win32 Exploits
      • Using IDA Pro for Reversing
      • Reconstructing sniffed images
      • Reverse engineering Windows PE Binaries
      • Session hijacking
      • Passive Network Analysis
      • Exploitation with a remote GUI
      • Sniffing SSL Encrypted Sessions
      • Format string exploits
      • Heap overflow exploits
      • Windows exploits
      • Calculating offsets
      • Reversing with SoftIce
      • OS determination without touching the target
      • SQL Injection timing attacks
      • Port redirection
      • ASP source disclosure attacks
      • Call-Back Backdoors
      • Encrypted covert channels
      • Remote keyloggers
      • PHP/MySQL SQL Injection
      • Inserting Malicious Code Into Unix Binaries

      View Pricing

      We will never share any of your information, spam you or annoy you with pushy sales pitches.

      Book your course

        What Our Students Are Saying

        Without any question, InfoSec has the most gifted individual instructors. Our instructor for this class was both an excellent educator and a premier/world class security expert. He was able to clearly explain and impart to the students, the most complicated security techniques I have ever heard of or imagined. I simply can not find the words to recommend him and Infosec security training more highly.

        John Hollan GE

        Advanced Ethical Hacking Training Boot Camp

        Career Tracks

        • Hacker Track

          The InfoSec Hacker Track will take you from 0 to 60 in your security career. By the time you successfully complete this track you will be highly credential-ed and in the top 5-10% of hackers in the world.
        Ready to get started? Get instant pricing for this award-winning boot camp. View course pricing
        View instant course pricing