Course Code



35 Hours


A firm understanding of TCP/IP Protocals is required to attend this course and ideally some prior experience and/or training in Ethical hacking methods.

Please note that programming experience is not required.



This class will help the attendees to scan, test, hack and secure their own systems. To gain an in-depth knowledge and practical experience with the current essential security systems. The attendees will get to know how perimeter defences work and then be led into scanning and attacking their own networks, no real network is harmed. The attendees then will learn how intruders escalate privileges and what steps can be taken to secure a system, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.


     Course Outline

Penetration Testing Process and Types

Vulnerability Assessment

Red Team skills

Penetration Testing Methodologies

Penetration Testing Tools

Metasploit Framework

Internal and External Network Penetration Testing

Firewall Penetration Testing

Windows Penetration Testing

Linux Penetration Testing

Web Application Penetration Testing

Database Penetration Testing

Physical Security Penetration Testing

Data Center Penetration Testing

Cloud Penetration Testing

Penetration Testing Reporting

Penetration Testing Reporting, do's and dont's

Capture the Flag lab


     Feedback (6)

I liked the in-depth knowledge about the subject of the trainer, good explanation, highlighting important things!.

Andreas Rhein

The delivery

- Department for Communities

Depth and breadth of the course. Trainer was excellent also.

- Department for Communities

Examples provided

- Department for Communities

Trainer's vast knowledge


Martin was very knowledgeable and gave really good tips; he allowed plenty of time for discussion and allowing us to ask questions. It was really well delivered, even virtually which sometimes is a difficult medium to work with.

Kewal Rai - Knowledgepool Group Ltd

The course could be tailored to suit your needs and objectives. It can also be delivered on your premises if preferred.



Online Price per participant 6000 AED


Classroom Price per participant 6000 AED





  Workday courses take place between 9:30 and 16:30


  Show venue details

Number of Participants

Related Courses

Total Courses 6

Information Security Risk

Information Security Risk

What is Information Security Risk?

CISA - Certified Information Systems Auditor

  28 hours

Building up information security according to ISO 27005

  21 hours

Open Data Risk Analysis and Management

  21 hours

Security Management

Security Management

What is Security Management?

CISM - Certified Information Security Manager

  28 hours

CISMP - Certificate in Information Security Management Principles

  21 hours

Computer Room Security and Maintenance

  14 hours

Cybersecurity Fundamentals

  21 hours

Open Authentication (OAuth)

  7 hours

Public Key Infrastructure

  21 hours

Security Policy Management

  35 hours

Information System Security

Information System Security

What is Information System Security?

Certified Information System Security Professional (CISSP) CBK Review

  35 hours


DevOps Security: Creating a DevOps Security Strategy

  7 hours

NB-IoT for Developers

  7 hours


IBM Qradar SIEM: Beginner to Advanced

  14 hours

Discounted Public Courses

This site in other countries/regions