Study any time, from any device.

Penetration Testing Cyber Range

Gain practical experience and build your real-world pentesting skills through 34 hands-on labs in the Penetration Testing Cyber Range.

34 labs  //  8 hours of training

Penetration Testing Cyber Range overview

This cyber range helps you develop your knowledge of penetration testing and ethical hacking by practicing on cloud-hosted virtual machines. You’ll build and reinforce your skills as you progress through labs covering a wide range of pentesting topics, including abusing protocols, scanning for vulnerabilities, identifying exploits and delivering payloads, and more. You’ll also perform several Capture the Flag (CTF) exercises designed to validate your new pentesting skills.

Labs

Linux Fundamentals
Lab
Linux Fundamentals

Linux Fundamentals

Explore the fundamentals of Linux and gain hands-on experience via the Penetration Testing Cyber Range.

Duration: 23:00

Abusing DNS
Lab
Abusing DNS

Abusing DNS

Learn about gathering information from DNS records as you practice in the Penetration Testing Cyber Range.

Duration: 10:00

Abusing SNMP
Lab
Abusing SNMP

Abusing SNMP

Learn about getting information from SNMP as you practice in the Penetration Testing Cyber Range.

Duration: 10:00

Wi-Fi Pentesting
Lab
Wi-Fi Pentesting

Wi-Fi Pentesting

Learn about cracking WEP and WPA2 keys as you practice in the Penetration Testing Cyber Range.

Duration: 4:00

Port and Protocol Scanning with Nmap
Lab
Port and Protocol Scanning with Nmap

Port and Protocol Scanning with Nmap

Get familiar with the process of port scanning using Nmap as you practice in the Penetration Testing Cyber Range.

Duration: 13:00

TCP/IP for Hackers
Lab
TCP/IP for Hackers

TCP/IP for Hackers

Learn about using TCP/IP for pentesting as you practice in the Penetration Testing Cyber Range.

Duration: 21:00

Host Discovery
Lab
Host Discovery

Host Discovery

Explore finding active hosts on a network as you practice in the Penetration Testing Cyber Range.

Duration: 9:00

Stealthy Network Reconnaissance
Lab
Stealthy Network Reconnaissance

Stealthy Network Reconnaissance

Learn stealthy scanning techniques with Nmap as you practice in the Penetration Testing Cyber Range.

Duration: 19:00

Advanced Scanning with Nmap
Lab
Advanced Scanning with Nmap

Advanced Scanning with Nmap

Hone your Nmap skills as you practice in the Penetration Testing Cyber Range.

Duration: 7:00

Scanning with Mobile Devices
Lab
Scanning with Mobile Devices

Scanning with Mobile Devices

Learn about running network scans from Android as you practice in the Penetration Testing Cyber Range.

Duration: 8:00

Sniffing
Lab
Sniffing

Sniffing

Discover why few things top having raw access to network traffic as you practice in the Penetration Testing Cyber Range.

Duration: 18:00

Service Identification
Lab
Service Identification

Service Identification

Learn about service identification as you practice in the Penetration Testing Cyber Range.

Duration: 8:00

CTF 1: DNS and SNMP Reconnaissance
Lab
CTF 1: DNS and SNMP Reconnaissance

CTF 1: DNS and SNMP Reconnaissance

Test your DNS and SNMP reconnaissance skills as you practice in the Penetration Testing Cyber Range.

Duration: 4:00

Hacking with Android
Lab
Hacking with Android

Hacking with Android

Learn about launching a remote exploit from an Android device as you practice in the Penetration Testing Cyber Range.

Duration: 9:00

Credential Harvesting with SET
Lab
Credential Harvesting with SET

Credential Harvesting with SET

Learn about stealing passwords as you practice in the Penetration Testing Cyber Range.

Duration: 14:00

Spearphishing
Lab
Spearphishing

Spearphishing

Explore compromising a system via malicious email as you practice in the Penetration Testing Cyber Range.

Duration: 12:00

Web App Hacking
Lab
Web App Hacking

Web App Hacking

Gain experience with web application hacking as you practice in the Penetration Testing Cyber Range.

Duration: 26:00

Server Side Exploit
Lab
Server Side Exploit

Server Side Exploit

Learn how to exploit a web server vulnerability as you practice in the Penetration Testing Cyber Range.

Duration: 12:00

CTF 2: Attacking FTP
Lab
CTF 2: Attacking FTP

CTF 2: Attacking FTP

Test your sniffing and password cracking skills as you practice in the Penetration Testing Cyber Range.

Duration: 4:00

Vulnerability Identification
Lab
Vulnerability Identification

Vulnerability Identification

Learn about vulnerability identification as you practice in the Penetration Testing Cyber Range.

Duration: 12:00

Basic SQL Injection
Lab
Basic SQL Injection

Basic SQL Injection

Discover how to exploit an SQL injection vulnerability as you practice in the Penetration Testing Cyber Range.

Duration: 26:00

Heartbleed Exploitation
Lab
Heartbleed Exploitation

Heartbleed Exploitation

Learn how to exploit the Heartbleed (OpenSSL) vulnerability as you practice in the Penetration Testing Cyber Range.

Duration: 10:00

Exploiting Vulnerable Services
Lab
Exploiting Vulnerable Services

Exploiting Vulnerable Services

Learn about gaining access to a remote systems as you practice in the Penetration Testing Cyber Range.

Duration: 15:00

CTF 3: Web Application Exploitation
Lab
CTF 3: Web Application Exploitation

CTF 3: Web Application Exploitation

Test your web application hacking skills as you practice in the Penetration Testing Cyber Range.

Duration: 4:00

SQL Injection Chained Exploitation
Lab
SQL Injection Chained Exploitation

SQL Injection Chained Exploitation

Explore combining SQL injection attacks as you practice in the Penetration Testing Cyber Range.

Duration: 11:00

Shellshock Exploitation
Lab
Shellshock Exploitation

Shellshock Exploitation

Learn about exploiting the Shellshock (GNU Bash) vulnerability as you practice in the Penetration Testing Cyber Range.

Duration: 11:00

Additional Payloads
Lab
Additional Payloads

Additional Payloads

Explore Metasploit payload options as you practice in the Penetration Testing Cyber Range.

Duration: 24:00

Android Exploitation
Lab
Android Exploitation

Android Exploitation

Learn about accessing Android devices remotely as you practice in the Penetration Testing Cyber Range.

Duration: 17:00

Client Side Exploits
Lab
Client Side Exploits

Client Side Exploits

Carry out an example of a client side exploit as you practice in the Penetration Testing Cyber Range.

Duration: 14:00

Using Ncat as a Trojan
Lab
Using Ncat as a Trojan

Using Ncat as a Trojan

Discover how to maintain access to compromised system with Ncat as you practice in the Penetration Testing Cyber Range.

Duration: 13:00

Post-Exploit Password Cracking
Lab
Post-Exploit Password Cracking

Post-Exploit Password Cracking

Learn about cracking hashed passwords gathered from a compromised system as you practice in the Penetration Testing Cyber Range.

Duration: 12:00

Covert Channels/Evasion
Lab
Covert Channels/Evasion

Covert Channels/Evasion

Learn about using encryption for covert communications and IDS evasion as you practice in the Penetration Testing Cyber Range.

Duration: 25:00

Intrusion Detection with Snort
Lab
Intrusion Detection with Snort

Intrusion Detection with Snort

Get an overview of using intrusion detection with Snort as you practice in the Penetration Testing Cyber Range.

Duration: 24:00

CTF 4: Privilege Escalation
Lab
CTF 4: Privilege Escalation

CTF 4: Privilege Escalation

Test your privilege escalation skills as you practice in the Penetration Testing Cyber Range.

Duration: 3:00

 

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer