The GPEN (GIAC Penetration Tester) course teaches you how to conduct ethical hacking and penetration testing on various systems and networks. You will learn how to perform reconnaissance, scanning, exploitation, post-exploitation, and reporting using various tools and techniques, such as Nmap, Metasploit, PowerShell Empire, Burp Suite, and Cobalt Strike. You will also learn how to apply the penetration testing methodology and framework (PTES) to different scenarios, such as web application testing, network testing, wireless testing, and social engineering testing. The course prepares you for the GPEN certification exam that validates your skills in penetration testing and ethical hacking.
The GIAC Penetration Tester (GPEN) training course is designed for cybersecurity professionals, ethical hackers, and penetration testers seeking to enhance their skills in assessing and identifying vulnerabilities in networks and systems. The course covers topics such as penetration testing methodology, network and host enumeration, vulnerability identification and analysis, exploitation techniques, password attacks, web application penetration testing, wireless penetration testing, and post-exploitation techniques. By completing the course and earning the GPEN certification, individuals demonstrate their proficiency in conducting thorough penetration tests, identifying vulnerabilities, and providing recommendations to improve security. The certification validates their expertise in penetration testing and qualifies them to contribute to strengthening the security posture of organizations.
Readynez is the best training provider I've used for many years. Their customer service is first class, prices are very competitive and instruction excellent.
Easy to attend over Teams and an excellent instructor gave me great value for the time I invested.
Your Personal Learning Program will provide the skills you need, to help you do more of what you love. The 3-step learning program is built to teach you real applicable skills that open opportunities for you.
The Readynez365 platform provides an enhanced digital pathway for all your learning elements, from pre-studies to exam, making it the most direct route to new tech Skills. Pick what you want (and need) to get up to speed. It´s all laid out for you in Readynez365 well in advance of your courses.
The training methodology is designed for the virtual classroom to inspire and engage you with a variation of hands-on training, presentations, labs and tests. You’ll also be glad to know that Virtual instructor-led training is loved by managers - it is the most cost-effective way to train.
There´s a maximum number of learners in the class to ensure your easy access to personal coaching. You’ll meet accredited expert instructors that are seasoned IT Professionals and Consultants certified to the highest level and bringing real-world experience into the classroom.
We´ll cover the ins and outs of the subject so that you can apply it in your day-to-day work, and you’ll even learn the specifics that you need to know for the exam. It’s your choice whether to sit the exam, or not, but with our detailed guides and hotline, we’ll make it easy to access your exam voucher, and schedule and sit the exam online
Your access to training is unlimited and you can train as much as you want until you successfully pass your exam.
Train with a clear conscience with training that makes a 96% lower carbon footprint compared to in-classroom training. Our organisation operates with minimal environmental impact and we´ve reduced our Co2 emission with 96% since 2020.We are compliant with the ISO 14001 throughout our entire supply chain as your guarantee for our sustainable business practices.
- Overview of penetration testing and ethical hacking concepts and methodology
- Overview of penetration testing tools and techniques
- Reconnaissance methods and tools (passive, active, OSINT)
- Scanning methods and tools (port scanning, service scanning, vulnerability scanning)
- Overview of exploitation techniques and challenges
- Exploitation methods and tools (Metasploit, PowerShell Empire, etc.)
- Post-exploitation methods and tools (Mimikatz, BloodHound, etc.)
- Privilege escalation methods and techniques (local, domain)
- Overview of web application penetration testing concepts and challenges
- Web application reconnaissance methods and tools (OWASP ZAP, Nikto, etc.)
- Web application exploitation methods and tools (SQL injection, XSS, CSRF, etc.)
- Web application post-exploitation methods and tools (web shells, session hijacking, etc.)
- Overview of network penetration testing concepts and challenges
- Network reconnaissance methods and tools (Nmap, Netcat, Wireshark)
- Network exploitation methods and tools (buffer overflows, RCE, file transfers)
- Network post-exploitation methods and tools (pivoting, port forwarding, tunneling)
- Overview of wireless penetration testing concepts and challenges
- Wireless reconnaissance methods and tools (aircrack-ng, Kismet)
- Wireless exploitation methods and tools (WEP cracking, WPA cracking, Evil Twin)
- Wireless post-exploitation methods and tools ( Rogue APs, MITM attacks)
- Overview of social engineering penetration testing concepts and challenges
- Social engineering reconnaissance methods and tools (Maltego, theHarvester)
- Social engineering exploitation methods and tools (phishing emails, malicious attachments)
- Social engineering post-exploitation methods and tools (keyloggers, webcams)
Meet some of the Readynez Instructors you can meet on your course. They are experts, passionate about what they do, and dedicated to give back to their industry, their field, and those who want to learn, explore, and advance in their careers.
Kevin has served for years as an authorised instructor for (ISC)2 and is renowned for his 20-year contribution to learners training for IT security skills
James is recognised for his more than 20 years of contribution to learning and certification within IT Security.
Friedhelm Düsterhöft has 30+ years of work experience in IT, Information Security and Data Privacy.
At Readynez, we provide many resources and have experienced experts in the field. That is why we are also very successful with many satisfied customers. You can therefore safely take your course with us. In order to take the GPEN course, however, some prerequisites are required.
You have the perfect starting point to take this course with these prerequisites:
With 15 years experience and more than 35.000 happy customers from all over the world, companies such as ALSO, ATEA, Microsoft, Serco, and many more, trust Readynez to help them train and certify their staff.
These are just some of the many major brands trusting Readynez.
The GCIH (GIAC Certified Incident Handler) course teaches you how to detect, respond to, and resolve computer security incidents. You will learn how to identify and analyze common attack techniques, such as phishing, malware, denial of service, web application attacks, and credential theft. You will also learn how to use various tools and frameworks, such as NIST SP 800-61, MITRE ATT&CK, SIFT Workstation, Volatility, Wireshark, and tcp dump, to investigate and contain incidents. The course prepares you for the GCIH certification exam that validates your skills in incident handling and response.VIEW COURSE
The GCLD (GIAC Cloud Security Essentials) course teaches you how to secure cloud environments using automation tools and techniques. You will learn how to use various cloud services and platforms, such as AWS, Azure, GCP, and Kubernetes. You will also learn how to apply various automation tools and frameworks, such as Terraform, Ansible, Cloud Formation, and Chef. You will also learn how to implement various security controls and best practices, such as identity and access management, encryption, logging and monitoring, and compliance. The course prepares you for the GCLD certification exam that validates your skills in cloud security automation.VIEW COURSE
The Virtual Classroom is an online room, where you will join your instructor and fellow classmates in real time. Everything happens live and you can interact freely, discuss, ask questions, and watch your instructor present on a whiteboard, discuss the courseware and slides, work with labs, and review.
Yes, you can sit exams from all the major Vendors like Microsoft, Cisco etc from the comfort of your home or office.
With Readynez you do any course form the comfort of your home or office. Readynez provides support and best practices for your at-home classroom and you can enjoy learning with minimal impact on your day-to-day life. Plus you'll save the cost and the environmental burden of travelling.
Well, learning is limitless, when you are motivated, but you need the right path to achieve what you want. Readynez consultants have many years of experience customizing learner paths and we can design one for you too. We are always available with help and guidance, and you can reach us on the chat or write us at email@example.com.