$ 20.00   USD
  • Course Code:  GA03

  • Term:  Open

  • Open for Enrollment

  • Self-paced

  • Course Author(s)
    Gabriel Avramescu

Original Price:   $ 20.00   USD

Network Penetration Tester - Jump Up A Level In Your Career


IT & Software / Network & Security

  • 0 7bv1h0o a43wmksv2knj ystcu1wzidvdzky6oq7s0thxgxr7bu0k4mvby9?1454934226
    gabriel avramescu



Learn now how to build your $120 000/year career as Ethical Hacker! 

A job that can be done from home, coffee shop or remote island!

In order to protect yourself from hackers, you must think as one.

You will learn hacking tools, methodologies and techniques. This is a both practical and theatrical step-by-step course.

This training is based on a practical approach of day-by-day situations and it contain labs based on real environments. For the labs, target virtual machines are provided.

The course objective is to help you learn to master the (ethical) hacking techniques and methodology that are used in penetration systems. The course is designed for IT passionate, network and system engineers, security officers.

Below are the main topics, both theoretical and practical, of this course:

Chapter 1: Introduction to Ethical Hacking, Footprinting and Reconnaissance

Chapter 2: Scanning Networks, Enumeration and Vulnerabilities

Chapter 3: System Hacking

Chapter 4: Sniffing

Chapter 5: Metasploit

Chapter 6: Trojans, Backdoors, Viruses and Worms

Chapter 7: Cryptography

Chapter 8: Penetration testing on Wireless Networks

Chapter 9: Penetration Testing



What are the requirements?

 Basic IT skills

 Basic knowledge of Linux and/or Windows

 Understand basic computer networking


What am I going to get from this course?

 Over 36 lectures and 5 hours of content!

 Understand and perform the basic steps in order to performa penetration testing of an infrastructure or other computers in the network

 Be able to gather information about your target

 You will learn how to find open ports your target

 You will learn how to find vulnerabilities in your target infrastructure

 Exploit found vulnerabilities

 Sniff and analyze network traffic

 You will learn how to exploit Windows and Linux Systems

 Understand and perform attacks using Metasploit

 Understand cryptography

 Understand the difference between backdoors, viruses and worms. Learn the basics of how to analyse them

 Hack wireless networks

 Understand the penetration testing process

 As a network administrator you will learn how to secure your network


What is the target audience?

 Anyone who want to learn the ethical hacking and penetration testing process

 Network and Security Engineers

 IT students

 Anyone who wants to start a career in it security field or as "ethical hacker"


Instructor Biography 


Gabriel Avramescu, Senior Information Security Consultant


I work in the Internet security team, focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary. Act as an effective participant in multidisciplinary security project team. -Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking). Make recommendations on security weaknesses and report on activities and findings. - Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated) - Security lab fixed and virtual assets design for different LAN / WAN architectures - Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment - Perform analysis and testing to verify the strengths and weaknesses of - Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.) - Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures - Assist with the development of remediation services for identified findings - Customize, operate, audit, and maintain security related tools and applications


IT Trainer

- Trainer for Web Application Hacking and Network Infrastructure Hacking - Training students for CCNA and CCNA Security Certification - Training NDG Linux Basics - Legal Main Contact - Curriculum Leader




  ISO 270001 Lead Auditor

  ECSA (EC-Council Certified Professional)

  CEH (Certified Ethical Hacker)

  CEI (Certified EC-Council Instructor)

  VMWare vSphere Install, Configure, Manage

  CCNA and CCNA Security

  CCNP Routing and CCNP Switching

  Advanced Linux&InfoSEC

  Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc.

New User? Sign up.

One Last Thing!

Check your email inbox and click on the email verification link we just sent you.

If it doesn’t reach your inbox in a few moments, it might be in your spam folder. Don’t forget to add our email address to your contacts if it did end up in spam! That’ll make sure it doesn’t happen again.

As soon as you’ve verified your email, you’ll be able to continue.



Confirm Payment

Payment Unavailable. Try again later.

Network Penetration Tester - Jump Up A Level In Your Career

20.0 USD

Credit Card