News

Axon Technologies Launches Live Online Training Course: Ethical Hacking and Penetration Testing

Axon

The Axon Cyber Institute PEN 111 training will boost students’ confidence in implementing and utilizing the best cybersecurity and hacking tools in the industry

Axon Technologies, a UAE-headquartered leading information security solutions provider, is announcing the launch of their virtual PEN 111: Network Ethical Hacking and Penetration Testing live online learning course, from June 1st-22nd, 2022. With hands-on labs and practical exercises, the course will illustrate the fundamentals of professional network penetration testing, in line with industry-level standards and methodology.

“At Axon Technologies, we want to ensure that every training course will elevate your cybersecurity career to the next level. PEN 111 is a customized remote learning experience designed to support students in every step of their journey. Cybersecurity is  rapidly developing by the moment – keeping up with changes in the field requires experienced and adaptable experts who are constantly upskilling and updating their knowledge of new trends and technologies. This course is designed for IT professionals who want to advance in their careers and move across their organizations,” says Hadi Hosn, Co-Founder and CEO, at Axon Technologies.

Led by Abed Samhuri, Cyber Institute Lead at Axon Technologies, the course is open to all who are interested in advancing their network security skills and verify their knowledge of the industry. It combines theoretical knowledge with practical activities, broken down into 10 modules for an ordered and comprehensible learning experience. Participants will not only learn the theories behind vulnerabilities and exploitations, but they will have the risk-free opportunity to practice all the techniques of standard penetration testing in labs simulating real-world scenarios.

They will learn all the technicalities of password cracking, breaking wireless networks, how to build an information profile of their target, advanced network scanning and vulnerability assessment methods, as well as how they can effectively exploit vulnerable systems and maintain access. Skills covered range from Intelligence Gathering, Network Traffic Manipulation, Network Mapping, Vulnerability Analysis, Exploitation, Post-Exploitation, Password Attacks to Wireless Attacks. Participants will be taught how to implement tools such as Maltego, Nessus, ArpSpoof, John the Ripper and several more.

Related posts

Industry-First Innovations in the Pure Storage Platform Help Customers Keep Pace with AI’s Rapid Evolution

Enterprise IT World MEA

Saudi Arabia Shows High Adoption and Planned Expansion of Hybrid Multicloud

Enterprise IT World MEA

Tenable to Acquire Eureka Security

Enterprise IT World MEA

Leave a Comment