Capture the Flag (CTF) Training Course

Course Code



14 hours (usually 2 days including breaks)


Firm understanding of the TCP/IP protocols.    
Programming knowledge is NOT required    
Desire to learn about Ethical Hacking, and get great penetration testing training


This class will help the attendees to scan, test, hack on secure their own systems, get in-depth knowledge and practical experience with the current essential security systems. the attendees know how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed, the attendees then will learn how intruders escalate privileges and what steps can be taken to secure a system, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.    

Course Outline

At the end of this course you will be able to demonstrate knowledge and understanding of:

  • Penetration Testing Process and Types
  • Vulnerability Assessment
  • Internal and External Network Penetration Testing
  • Firewall, IPS/IDS, Servers, Wireless, Cloud Penetration Testing
  • Network CTF
  • Wireless CTF
  • Web Application CTF
  • Servers CTF



Related Categories

Related Courses

Course Discounts

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

This site in other countries/regions