Penetration Testing Cyber Range overview
This cyber range helps you develop your knowledge of penetration testing and ethical hacking by practicing on cloud-hosted virtual machines. You’ll build and reinforce your skills as you progress through labs covering a wide range of pentesting topics, including abusing protocols, scanning for vulnerabilities, identifying exploits and delivering payloads, and more. You’ll also perform several Capture the Flag (CTF) exercises designed to validate your new pentesting skills.
Port and Protocol Scanning with Nmap
TCP/IP for Hackers
Stealthy Network Reconnaissance
Advanced Scanning with Nmap
Scanning with Mobile Devices
CTF 1: DNS and SNMP Reconnaissance
Hacking with Android
Credential Harvesting with SET
Web App Hacking
Server Side Exploit
CTF 2: Attacking FTP
Basic SQL Injection
Exploiting Vulnerable Services
CTF 3: Web Application Exploitation
SQL Injection Chained Exploitation
Client Side Exploits
Using Ncat as a Trojan
Post-Exploit Password Cracking
Intrusion Detection with Snort
CTF 4: Privilege Escalation
You're in good company
"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had."
"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."
"I’ve taken five boot camps with Infosec and all my instructors have been great."