
Advanced Penetration Testing (APT)
$1,995.00 Per Enrollment
Price Includes:Courseware and ‘Price & Quality Guarantee’
Are you ready to take your hacking skills to the next level? Welcome to TrainACE's - Advanced Penetration Testing (APT) - training. APT is an intense, hands-on training class that makes traditional pentesting training classes look like a Security+ class.
Be ready to learn the art of pentesting high-security environments using advanced persistent threat techniques and the highest level hacking techniques available in any classroom.

Enroll today, by selecting a class' date, to the right
Got Questions?
For more information about your specific needs call us at (301) 220 2802 or complete the form below:
Learn More About Advanced Penetration Testing
Jump to:
Class Schedule
Why Take Advanced Penetration Testing Training?
Prerequisites
Exam and Certification Requirements
Skills and Concepts
Class Schedule
Why Take Advanced Penetration Testing?
Our most advanced penetration testing is a class where you will experience real pentesting in high-security environments. The course is a three-day intensive that focuses on attacking and defending highly secured environments such as agencies, financial organizations, federal organizations, and large companies.
Audience and Prerequisites:
Students must be familiar with IT Security best practices and have a good understanding of TCP/IP and common web technologies:
- Basic Windows administration for servers and workstations
- Basic Linux/*NIX system administration skill
- Basic command line proficiency on both Windows and *NIX systems
Students should be familiar with the following web technologies and languages:
- HTTP
- HTML
- Javascript
- ASP
- PHP
- SQL
Students should also be familiar with Metasploit, and VMWare.
Class completion of the CEH and or ECSA/LPT and equivalent industry experience is required.
Signup today for our convenient Advanced Penetration Testing boot camp!
Related Careers:
Our Advanced Penetration Testing training will benefit people who are in, or looking to move into roles related to the following job titles:
- Penetration Tester
- Cyber Security Penetration Tester
- Security Engineer - Pen Tester
- Information Security Assessor (Penetration Tester)
Exam and Certification Requirements:
The Advanced Penetration Testing class is a practical course designed to improve yoru skills, it is not geared to any specific certification exams, although we will reinforce many skill tested in major certification exams./p>
What will I learn in this Advanced Penetration Testing class?
Understanding the Defender: IDS/IPS overview and bypass, antivirus bypasses, binary evasion and packing binaries
- Attacking from the Web: Cross-site scripting (XSS) attacks, SQL injection attack, remote file inclusion, local file inclusion
- Exploiting the Network: Client-side (browser) exploitation, Windows privilege escalation, Linux privilege escalation, re-purposing administrative tools
- Post Exploitation: Windows persistence techniques, enabling RDP/VNC, Linux persistence techniques, backdooring SSH logins, post exploitation reconnaissance, data exfiltration techniques
Are you ready to take your hacking skills to the next level? Welcome to TrainACE's - Advanced Penetration Testing (APT) - training. APT is an intense, hands-on training class that makes traditional pentesting training classes look like a Security+ class.
Be ready to learn the art of pentesting high-security environments using advanced persistent threat techniques and the highest level hacking techniques available in any classroom.

Enroll today, by selecting a class' date, to the right
Got Questions?
For more information about your specific needs call us at (301) 220 2802 or complete the form below:
Learn More About Advanced Penetration Testing
Jump to:
Class Schedule
Why Take Advanced Penetration Testing Training?
Prerequisites
Exam and Certification Requirements
Skills and Concepts
Class Schedule
Why Take Advanced Penetration Testing?
Our most advanced penetration testing is a class where you will experience real pentesting in high-security environments. The course is a three-day intensive that focuses on attacking and defending highly secured environments such as agencies, financial organizations, federal organizations, and large companies.
Audience and Prerequisites:
Students must be familiar with IT Security best practices and have a good understanding of TCP/IP and common web technologies:
- Basic Windows administration for servers and workstations
- Basic Linux/*NIX system administration skill
- Basic command line proficiency on both Windows and *NIX systems
Students should be familiar with the following web technologies and languages:
- HTTP
- HTML
- Javascript
- ASP
- PHP
- SQL
Students should also be familiar with Metasploit, and VMWare.
Class completion of the CEH and or ECSA/LPT and equivalent industry experience is required.
Signup today for our convenient Advanced Penetration Testing boot camp!
Related Careers:
Our Advanced Penetration Testing training will benefit people who are in, or looking to move into roles related to the following job titles:
- Penetration Tester
- Cyber Security Penetration Tester
- Security Engineer - Pen Tester
- Information Security Assessor (Penetration Tester)
Exam and Certification Requirements:
The Advanced Penetration Testing class is a practical course designed to improve yoru skills, it is not geared to any specific certification exams, although we will reinforce many skill tested in major certification exams./p>
What will I learn in this Advanced Penetration Testing class?
Understanding the Defender: IDS/IPS overview and bypass, antivirus bypasses, binary evasion and packing binaries
- Attacking from the Web: Cross-site scripting (XSS) attacks, SQL injection attack, remote file inclusion, local file inclusion
- Exploiting the Network: Client-side (browser) exploitation, Windows privilege escalation, Linux privilege escalation, re-purposing administrative tools
- Post Exploitation: Windows persistence techniques, enabling RDP/VNC, Linux persistence techniques, backdooring SSH logins, post exploitation reconnaissance, data exfiltration techniques