About our courses

Through years of experience working with more than 1000 top companies in the world, we ́ve architected the Readynez method for learning.
Train in any technology using the award-winning Readynez method and combine any variation of learning style, technology and place, to take learning ambitions from intent to impact.

Learn more about Readynez Training

(199 Reviews)

GIAC Penetration Tester (GPEN)

Your personal Learning Program with everything you need to best prepare for the Exam and become a Certified GIAC Penetration Tester (GPEN), supported by your expert instructor.

course: GIAC Penetration Tester (GPEN)

Duration: 5 days

Format: Virtual or Classroom

Prepares for Exam : GIAC Penetration Tester (GPEN)

Prepares for Certification : GIAC Penetration Tester (GPEN)

The best course to get your GIAC Penetration Tester (GPEN) Exam and Certification - with Certification Guarantee!

The GPEN (GIAC Penetration Tester) course teaches you how to conduct ethical hacking and penetration testing on various systems and networks. You will learn how to perform reconnaissance, scanning, exploitation, post-exploitation, and reporting using various tools and techniques, such as Nmap, Metasploit, PowerShell Empire, Burp Suite, and Cobalt Strike. You will also learn how to apply the penetration testing methodology and framework (PTES) to different scenarios, such as web application testing, network testing, wireless testing, and social engineering testing. The course prepares you for the GPEN certification exam that validates your skills in penetration testing and ethical hacking.

  • Includes a comprehensive set of Learning materials for the best possible Exam prep
  • No outdated and pre-recorded videos. Updated and Live instructor-led sessions - guaranteed!
  • Included in our Unlimited Training offering, giving you Unlimited access to Security courses
  • Full support available helping you register, prepare for and sit your exam

Who is the GIAC Penetration Tester (GPEN) training course for?

The GIAC Penetration Tester (GPEN) training course is designed for cybersecurity professionals, ethical hackers, and penetration testers seeking to enhance their skills in assessing and identifying vulnerabilities in networks and systems. The course covers topics such as penetration testing methodology, network and host enumeration, vulnerability identification and analysis, exploitation techniques, password attacks, web application penetration testing, wireless penetration testing, and post-exploitation techniques. By completing the course and earning the GPEN certification, individuals demonstrate their proficiency in conducting thorough penetration tests, identifying vulnerabilities, and providing recommendations to improve security. The certification validates their expertise in penetration testing and qualifies them to contribute to strengthening the security posture of organizations.

Feedback from our delegates

Stephen Ridgway

Readynez is the best training provider I've used for many years. Their customer service is first class, prices are very competitive and instruction excellent.

Johan Andersson
Johan Andersson

Easy to attend over Teams and an excellent instructor gave me great value for the time I invested.

Everything you need to get the results you want

Your Personal Learning Program will provide the skills you need, to help you do more of what you love. The 3-step learning program is built to teach you real applicable skills that open opportunities for you.

How we get you certified

Readynez365: Your Personal Learning Program

The Readynez365 platform provides an enhanced digital pathway for all your learning elements, from pre-studies to exam, making it the most direct route to new tech Skills. Pick what you want (and need) to get up to speed. It´s all laid out for you in Readynez365 well in advance of your courses.

Prepared Logo
Learning Designed For The Virtual Classroom

The training methodology is designed for the virtual classroom to inspire and engage you with a variation of hands-on training, presentations, labs and tests. You’ll also be glad to know that Virtual instructor-led training is loved by managers - it is the most cost-effective way to train.

Virtual Learning Logo
Expert Mentoring That Get’s You All The Way

There´s a maximum number of learners in the class to ensure your easy access to personal coaching. You’ll meet accredited expert instructors that are seasoned IT Professionals and Consultants certified to the highest level and bringing real-world experience into the classroom.

Expert Logo
Exam & Skills Focus

We´ll cover the ins and outs of the subject so that you can apply it in your day-to-day work, and you’ll even learn the specifics that you need to know for the exam. It’s your choice whether to sit the exam, or not, but with our detailed guides and hotline, we’ll make it easy to access your exam voucher, and schedule and sit the exam online

Social Learning Logo
Certification Guarantee

Your access to training is unlimited and you can train as much as you want until you successfully pass your exam.

Sustainable Learning - Train with a Clear Conscience

Train with a clear conscience with training that makes a 96% lower carbon footprint compared to in-classroom training. Our organisation operates with minimal environmental impact and we´ve reduced our Co2 emission with 96% since 2020.We are compliant with the ISO 14001 throughout our entire supply chain as your guarantee for our sustainable business practices.

What you will learn during our GIAC Penetration Tester (GPEN) course

- Overview of penetration testing and ethical hacking concepts and methodology
- Overview of penetration testing tools and techniques
- Reconnaissance methods and tools (passive, active, OSINT)
- Scanning methods and tools (port scanning, service scanning, vulnerability scanning)

- Overview of exploitation techniques and challenges
- Exploitation methods and tools (Metasploit, PowerShell Empire, etc.)
- Post-exploitation methods and tools (Mimikatz, BloodHound, etc.)
- Privilege escalation methods and techniques (local, domain)

- Overview of web application penetration testing concepts and challenges
- Web application reconnaissance methods and tools (OWASP ZAP, Nikto, etc.)
- Web application exploitation methods and tools (SQL injection, XSS, CSRF, etc.)
- Web application post-exploitation methods and tools (web shells, session hijacking, etc.)

- Overview of network penetration testing concepts and challenges
- Network reconnaissance methods and tools (Nmap, Netcat, Wireshark)
- Network exploitation methods and tools (buffer overflows, RCE, file transfers)
- Network post-exploitation methods and tools (pivoting, port forwarding, tunneling)

- Overview of wireless penetration testing concepts and challenges
- Wireless reconnaissance methods and tools (aircrack-ng, Kismet)
- Wireless exploitation methods and tools (WEP cracking, WPA cracking, Evil Twin)
- Wireless post-exploitation methods and tools ( Rogue APs, MITM attacks)

- Overview of social engineering penetration testing concepts and challenges
- Social engineering reconnaissance methods and tools (Maltego, theHarvester)
- Social engineering exploitation methods and tools (phishing emails, malicious attachments)
- Social engineering post-exploitation methods and tools (keyloggers, webcams)

Meet our instructors

Meet some of the Readynez Instructors you can meet on your course. They are experts, passionate about what they do, and dedicated to give back to their industry, their field, and those who want to learn, explore, and advance in their careers.

Kevin Henry

Kevin has served for years as an authorised instructor for (ISC)2 and is renowned for his 20-year contribution to learners training for IT security skills

James Rowney

James is recognised for his more than 20 years of contribution to learning and certification within IT Security.

Friedhelm Düsterhöft

Friedhelm Düsterhöft has 30+ years of work experience in IT, Information Security and Data Privacy.

How to best be prepared for our GIAC Penetration Tester (GPEN) course

At Readynez, we provide many resources and have experienced experts in the field. That is why we are also very successful with many satisfied customers. You can therefore safely take your course with us. In order to take the GPEN course, however, some prerequisites are required.

You have the perfect starting point to take this course with these prerequisites:

  • Basic understanding of TCP/IP networking and protocols
  • Basic familiarity with Linux and Windows operating systems and command line tools
  • Basic knowledge of web application development and security
  • Basic knowledge of scripting languages such as Python, PowerShell, or Ruby

Our track record

With 15 years experience and more than 35.000 happy customers from all over the world, companies such as ALSO, ATEA, Microsoft, Serco, and many more, trust Readynez to help them train and certify their staff.

  • Top rated courses, with learners most often rating their training 10/10
  • Globally recognized expert instructors, many of which are MVP's
  • 35.000 delegates trained and certified
  • Trusted provider of large training projects for many large companies

These are just some of the many major brands trusting Readynez.

Others also attended

GIAC Certified Incident Handler (GCIH)

The GCIH (GIAC Certified Incident Handler) course teaches you how to detect, respond to, and resolve computer security incidents. You will learn how to identify and analyze common attack techniques, such as phishing, malware, denial of service, web application attacks, and credential theft. You will also learn how to use various tools and frameworks, such as NIST SP 800-61, MITRE ATT&CK, SIFT Workstation, Volatility, Wireshark, and tcp dump, to investigate and contain incidents. The course prepares you for the GCIH certification exam that validates your skills in incident handling and response.

GIAC Cloud Security Essentials (GCLD)

The GCLD (GIAC Cloud Security Essentials) course teaches you how to secure cloud environments using automation tools and techniques. You will learn how to use various cloud services and platforms, such as AWS, Azure, GCP, and Kubernetes. You will also learn how to apply various automation tools and frameworks, such as Terraform, Ansible, Cloud Formation, and Chef. You will also learn how to implement various security controls and best practices, such as identity and access management, encryption, logging and monitoring, and compliance. The course prepares you for the GCLD certification exam that validates your skills in cloud security automation.



The Virtual Classroom is an online room, where you will join your instructor and fellow classmates in real time. Everything happens live and you can interact freely, discuss, ask questions, and watch your instructor present on a whiteboard, discuss the courseware and slides, work with labs, and review.

Yes, you can sit exams from all the major Vendors like Microsoft, Cisco etc from the comfort of your home or office.

With Readynez you do any course form the comfort of your home or office. Readynez provides support and best practices for your at-home classroom and you can enjoy learning with minimal impact on your day-to-day life. Plus you'll save the cost and the environmental burden of travelling.

Well, learning is limitless, when you are motivated, but you need the right path to achieve what you want. Readynez consultants have many years of experience customizing learner paths and we can design one for you too. We are always available with help and guidance, and you can reach us on the chat or write us at info@readynez.com.



Price: {{item.ItemPriceExVatFormatted}} {{item.Currency}}