2015 Training

This year we are pleased to announce both 4 and 2 day trainings at NolaCon!

All trainings include full conference admission to NolaCon.

4-day training:

Intro & Advanced Penetration Testing  (June 8th-11th)

Introduction to penetration testing will give you hands-on experience in many facets of penetration testing. This class will be conducted using Kali Linux against Windows and Linux target virtual machines. Students will become familiar with the phases of the Penetration Testing Execution Standard (PTES) and the common tools of the trade such as Metasploit, Nmap, Nessus, Maltego, Immunity Debugger and many others.

Picking up where Introduction to Penetration Testing left off, this course provides a deeper dive into the latest penetration testing techniques being used on engagements. Leaving behind default passwords and missing patches, in this class we will look at client side and social engineer attacks that work even in secure environments.

2-day training:

Introduction to Penetration Testing (June 8th & 9th)

Introduction to penetration testing will give you hands-on experience in many facets of penetration testing. This class will be conducted using Kali Linux against Windows and Linux target virtual machines. Students will become familiar with the phases of the Penetration Testing Execution Standard (PTES) and the common tools of the trade such as Metasploit, Nmap, Nessus, Maltego, Immunity Debugger and many others.

Advanced Penetration Testing (June 10th & 11th)

Picking up where Introduction to Penetration Testing left off, this course provides a deeper dive into the latest penetration testing techniques being used on engagements. Leaving behind default passwords and missing patches, in this class we will look at client side and social engineer attacks that work even in secure environments.

Physical Penetration Testing (June 10th & 11th)

Physical security is an oft-overlooked component of data and system security in the technology world. While frequently forgotten, it is no less critical than timely patches, appropriate password policies, and proper user permissions. You can have the most hardened servers and network but that doesn’t make the slightest difference if someone can gain direct access to a keyboard or, worse yet, march your hardware right out the door.