Main Menu
My Infosec
Main Menu
My Infosec

GPEN Certification Training Boot Camp

InfoSec Institute offers this five-day accelerated GPEN Boot Camp to train and prepare you for the GIAC® Penetration Tester (GPEN) certification exam, the prestigious security certification created and administered by the Global Information Assurance Certification.

Award Winning Training

For 20 years InfoSec has been one of the most awarded and trusted information security training vendors – 42 industry awards!

Analysts Recommended

IDC lists InfoSec Institute as Major Player in their Security Training Vendor Assessment.

Comprehensive Hands-On Labs

Practice penetration testing with hundreds of exercises across more than 20 hands-on labs.

GPEN Course Overview

Our GPEN Boot Camp focuses on preparing you for the GPEN exam through engaging lectures and hands-on exercises. Penetration testing is a critical part of any organization’s IT security program and is required by multiple regulations and standards. You’ll leave with the ability to discover, assess and mitigate threats to information assets. GPEN holders demonstrate an understanding of penetration-testing methodologies, the relevant legal issues and the ability to properly conduct a penetration test using best practice technical and non-technical techniques.

Our program is designed around the GPEN topic areas and provides you with a quick and proven method for mastering the huge range of knowledge defined in the GPEN Exam Certification Objectives & Outcome Statements. This intense, five-day total immersion training experience is the product of a wide range of leading industry experts and authors, and has a significant return on investment, since you gain pentesting skills that are highly in demand, as well as the GIAC Penetration Tester certification.

Award-Winning Training

Why Choose InfoSec for GPEN Training?

Industry-Leading Exam Pass Rates – 93% of our students pass their certification exams on their first attempt

Training to Fit Your Schedule – In addition to providing the highest quality Live Online training in the industry, Infosec Institute offers in-person classroom training around the country and learn-at-your-own pace Mentored Online courses

Experienced Instructors – InfoSec Institute instructors have at least 10 years of industry training experience and are professionals with active roles in the industry

Most Thorough Exam Prep Services Available – Students get free exam readiness testing through SkillSet.com as well as advanced access to all course materials

What Our Students Are Saying

Without any question, InfoSec has the most gifted individual instructors. Our instructor for this class was both an excellent educator and a premier/world class security expert. He was able to clearly explain and impart to the students, the most complicated security techniques I have ever heard of or imagined. I simply can not find the words to recommend him and Infosec security training more highly.
JH

John Hollan GE

Advanced Ethical Hacking Training Boot Camp

Hands-on Labs with In-classroom Equipment

Hundreds of exercises in over 20 separate hands-on labs bring you up to speed with the latest threats to which your organization is most vulnerable. Practice penetration testing on our virtualized environment that simulates a full range of servers and services used in a real company. Learn how to compromise web servers, virtual machines, databases, routers and firewalls, and then put it all together in an unscripted evening CTF (capture the flag) exercise.

What's Included?

  • Five days of InfoSec Institute training with a leading security expert, bringing field experience and insight
  • GPEN Boot Camp all-in-one textbook
  • GPEN sample exam questions
  • GPEN exam voucher
  • Pre-shipment of textbook
  • InfoSec Flex video archive of course you attended
  • InfoSec Flex detailed reporting on exam readiness

Who Should Attend?

  • -Penetration testers

  • -IT security professionals whose responsibilities involve conducting security assessments

  • -Ethical hackers

  • -IT security auditors

  • -Incident responders and computer forensic investigators

  • -IT and information security professionals who want to expand their knowledge about offensive security

GPEN Certification Details

GPEN certificate holders are expected to have an understanding of the fundamental concepts associated with pentesting, including utilizing a process-oriented approach to pentesting and reporting.

What are the Prerequisites for this Course?

  • Firm understanding of the Windows operating system
  • Basic understanding of Windows and Linux command line
  • Working knowledge of computer networking and the TCP/IP protocols
  • Basic understanding of cryptographic concepts

Our Major Clients

GPEN Course Syllabus

    Our instructors give you 100% of their time and dedication to ensure that your time is well spent. You receive an immersive experience with no distractions! The typical daily schedule is:

    • Day 1: Pentesting and reconnaissance
      • Course overview
      • Introduction to pentesting
        • Role of penetration tester
        • Penetration testing fundamentals
      • Penetration testing process
        • Penetration testing methodologies
        • Penetration testing steps
        • Reporting results
      • Reconnaissance phase
        • Finding and using publicly available information
        • Passive recon methods
        • Determining IP ranges
        • Scanning tools and techniques
        • Port scanning
        • OS fingerprinting
        • Service version scans
        • Advanced scanning techniques
        • Vulnerability scanning and mapping
    • Day 2: Exploitation
      • Exploitation phase
        • Types of exploits
        • Finding and using exploits
        • Metasploit framework components and terminology
        • Metasploit modules
        • Exploitation process with Metasploit
        • Creating and encoding payloads with msfvenom
        • Delivering payloads
        • Command shell vs. terminal access
        • Using meterpreter payload
      • Post-exploitation
        • Basic password attacks (guessing)
        • Obtaining and cracking password hashes
        • Advanced password cracking tools and techniques
        • Data exfiltration
        • File manipulation and movement
    • Day 3: Command line and PowerShell
      • Using Windows command line
        • Learning advanced command line skills
        • Gathering target system information via command line
        • Windows exploitation tools
      • Leveraging PowerShell
        • PowerShell introduction
        • PowerShell capabilities for pentesting
        • Advanced port-exploitation techniques with PowerShell
    • Day 4: Web app and wireless pentesting
      • Web application pentesting
        • Web application vulnerabilities overview
        • Scanning for web application vulnerabilities
        • Using proxies
        • Exploiting injection flaws
        • Exploiting XSS and CSRF
      • Attacking wireless networks
        • Wireless networks fundamentals
        • Wireless encryption standards
        • Wireless pentesting tools and techniques
    • Day 5: Exam review
      • GPEN exam review

    View Pricing

    We will never share any of your information, spam you or annoy you with pushy sales pitches.

    Book your course

      Ready to get started? Get instant pricing for this award-winning boot camp. View course pricing
      View instant course pricing