
Train On-Demand
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn More<br>The Network Security course will cover security testing methodology, techniques, and tools for networked PC and devices.</br> <br>This course is part of the Penetration Testing Professional Learning path which prepares you for the eCPPTv2 exam and certification</br>
Instructor for this course
Fabrizio Siciliano
Information Gathering Introduction - Study Guide
Search Engines - Study Guide
Information Gathering
Social Media - Study Guide
Infrastructures - Study Guide
Whois Lookup
Information Gathering DNS
Host Discovery with Fping Hping Nmap
Maltego
Tools - Study Guide
Foca Shodan
Introduction - Study Guide
Wireshark Introduction
Hping Basics
Detect Live Hosts and Port - Study Guide
Nmap Basics
Nmap NSE
Idle Scan Hping Nmap
Service and OS Detection - Study Guide
Scanning
Firewall IDS Evasion - Study Guide
Advanced Port Scanning
Enumeration - Study Guide
NetBIOS - Study Guide
NetBIOS and Null Session
SNMP - Study Guide
SNMP Enumeration
NetBIOS Hacking
SNMP Analysis
What is Sniffing - Study Guide
Sniffing in Action - Study Guide
Basics of ARP - Study Guide
Sniffing Tools - Study Guide
Traffic Sniffing with TCPdump
MiTM Attacks - Study Guide
Attacking Tools - Study Guide
Man in the Middle
Intercepting SSL Traffic - Study Guide
Cain and Abel
Poisoning and Sniffing
NBT-NS Poisoning and Exploitation with Responder
ICMP Redirect Attack
Vulnerability Assessment - Study Guide
Nessus
Low Hanging Fruits - Study Guide
Authentication Bruteforcing
Exploitation - Study Guide
Metasploit Basic Usage
LM NTLM Cracking
EternalBlue & Metasploit
Client Side Exploitation
Remote Exploitation
Metasploit Usage
Responder & Multirelay
VA and Exploitation
Nessus
Client-Side Exploitation
DNS and SMB Relay Attack
Introduction - Study Guide
Privilege Escalation and Maintaining Access - Study Guide
Privilege Escalation
Exploiting Unquoted Service Paths
Maintaining Access
DLL Hijacking
Pillaging - Study Guide
Pillaging
Bypassing Firewalls and Data Exfiltration with DNS Tunneling
Mapping the Internal Network - Study Guide
Mapping the Network
Exploitation Through Pivoting - Study Guide
Exploiting via Pivoting
Meterpreter SSL Certificate Impersonation and Detection Evasion
Obtaining Stored Credentials with SessionGopher
Post-Exploitation
Blind Penetration Test
Privilege Escalation
Privilege Escalation Via Services
Finding and Exploiting DLL Hijacking Vulnerabilities
Bypassing AV
Anonymity - Study Guide
Browsing Anonymously - Study Guide
Tunneling for Anonymity - Study Guide
What Is It - Study Guide
Types of Social Engineering - Study Guide
Samples of Social Engineering Attacks - Study Guide
Pretexting Samples - Study Guide
Tools - Study Guide
Social Engineering Linux Targets
Take your technical training into your own hands and stay engaged with our learn-by-doing platform where you can put your skills to the test with hands-on exercises, quizzes, and labs.
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn MoreINE quizzes, labs, projects, and exercises help reinforce your knowledge.
Learn MoreOrganized training helps guide you through the most relevant subjects for certification prep.
Learn MoreWe add new courses and learning materials to the platform weekly so you're always up-to-date.
Learn MoreIf you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?