spacer
  • SANS Site Network
    • Current Site
    • spacer Penetration Testing
    • Choose a different site Help
    • spacer Training
    • spacer Certification
    • spacer Internet Storm Center
    • spacer Cyber Security Graduate School
    • spacer Security Awareness Training
    • spacer Cyber Defense Foundations
    • spacer IT Audit
    • spacer Computer Forensics
    • spacer Software Security
  • Resources
    • Blog
    • CTF Winners
    • Links
    • Downloads
    • MobiSec
    • Webcasts
    • Whitepapers
  • Courses
    • Hacker Techniques & Incident Handling SEC504
    • Web App Pen Testing In-Depth SEC542
    • Network Pen Testing In-Depth SEC560
    • SEC573
    • Mobile Device Security SEC575
    • Metasploit Kung Fu SEC580
    • Wireless Pen Testing & Defenses SEC617
    • Advanced Web Pen Testing SEC642
    • Advanced Pen Testing and Exploit Dev SEC660
    • Advanced Exploit Development SEC710
    • SEC560 vs CEH
  • Events
    • Training Opportunities
  • Certification
    • GCIH - Certified Incident Handler
    • GPEN - Penetration Tester
    • GWAPT - Web Application Penetration Tester
    • GXPN - Certified Exploit Developer
    • Certified Pen Testers
    • GIAC Code of Ethics
    • GIAC Homepage
  • Instructors
    • SANS Instructors
    • Author Statements
  • About
    • About
    • Testimonials
    • Curriculum
spacer spacer spacer

Want to learn penetration testing from the best?

 

Mission Statement

To give Security Professionals the tools and expertise they need to conduct high-value penetration testing focused on discovering and exploiting vulnerabilities to determine and reduce business risk.

Read More

Community Resources

The SANS Computer Security Community offers information security professionals an opportunity to learn, discuss, and share current developments in the field. It also provides information regarding security training, certification, and events.

Read More

Course Overview

As cyber attacks increase, so does the demand for information security professionals who possess true network penetration testing and ethical hacking skills. Round out defensive information security skills with the strong offensive skills and techniques.

Read More

Author Statement

"Successful penetration testers don't just throw a bunch of hacks against an organization and regurgitate the output of their tools. Instead, they need to understand how these tools work in-depth, and conduct their test in a careful, professional manner. This course explains the inner workings of numerous tools and their use in effective network penetration testing and ethical hacking projects."
- Ed Skoudis

Read More
spacer
Latest Blog Posts

Avoiding Pen Test DOOM: Protecting Customer Data
September 24, 2012 - 3:40 PM

Pen Test Privilege Escalation Through Suspended Virtual Machines
August 03, 2012 - 4:23 PM

Pen Testing in the Cloud
July 05, 2012 - 12:55 PM

Latest Tweets @pentesttips

Thought-provoking article by @joswr1ght on Apple's iOS patch [...]
October 8, 2012 - 1:40 PM

New blog post by Tony Turner on crucial topic of protecting [...]
September 24, 2012 - 4:52 PM

Reminder: @edskoudis webcast today, 1 PM ET on "5 Reasons It [...]
September 11, 2012 - 1:58 PM

Latest Papers

Exploiting Embedded Devices
By Neil Jones

InfiniBand Fabric and Userland Attacks
By Aron Warren

Incident Handling in the Healthcare Cloud: Liquid Data and the Need for Adaptive Patient Consent Management
By Barbara Filkins

"This is the best hands-on course available anywhere."
- Whitney Janes, FedEx

"Ed Skoudis is the best teacher I've ever had. He is 100% competent and professional."
- Petra Klein, FRA

"This was by far the best course I have ever taken."
- Peter Lombars, Intrucom Inc.

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.