Who should attend
Technical professionals who work in information security and those interested in entering the field.
About the course
The role of ethical hacker and penetration tester has emerged as one of the most important in the information security industry. Discovering system vulnerabilities internally before the bad guys exploit them can save companies millions of dollars and prevent the exposure of highly sensitive information.
In this three-course certificate program, we’ll cover the foundations of ethical hacking, including reconnaissance, exploitation and the rules of engagement. You’ll discover how to perform password, wireless, web, mobile and cloud application attacks. Don your white hat and protect your organization’s valuable information with the latest industry skills and knowledge.
What you’ll learn
- How to conduct and support penetration testing on enterprise network assets
- Planning and assessment of a security profile and posture
- System vulnerabilities and exploits
- Analysis of an organization’s computer network defense policies
- Evaluation of regulatory compliance and organizational directives
Get hands-on experience
- Practice various real-world hacking techniques using a virtual server
- Participate in a Capture the Flag practicum exercise
Craig Pearce is a senior security engineer at Amazon Web Services. Pearce’s background includes security architecture, threat modeling, penetration testing, code review and managing security assurance teams. He is currently based in the United States and has previously worked in Australia and the...
James Walker’s career in the IT industry spans more than 15 years and includes experience in system administration, software development and information security. For the majority of his career, he worked in information security for a large regional financial institution with a focus on identity ...
Alex Chantavy is a software engineer on Lyft's security team. As one of the main developers on Cartography, his biggest security interests are understanding permissions relationships in cloud systems and finding opportunities for lateral movement. Before Lyft, Chantavy was a senior penetration ...
Videos and materials
Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.
We are happy to help you find a suitable online alternative.