top of page


During this comprehensive course, tools and methodologies that are used during penetration tests in enterprise network/application environments will be detailed. The course will utilize a lab environment for a hands-on instruction of manual penetration testing methods, in addition to training for use of exploitation frameworks, such as Metasploit, Empire and others.

The focus will be geared towards methodology, processes, vectors, tools, and techniques used for exploitation in areas such as infrastructure, web & cloud. By the end of the course, the student will have an in-depth understanding of the underlying principles of network/application exploitation and will have gained experience in the successful execution of attacks.

Minimum Course Requirements:

  • Bring a Laptop with:

    • 8GB of RAM

    • Quad-Core Processor

    • Ability to Run Virtual Machines

  • Prerequisites

    • Understanding of basic networking concepts

    • Basic Linux comprehension

Target Audience:

This seminar is geared toward those seeking to enter the information security industry while also enriching those who seek to develop the skills and experience necessary to succeed as a penetration tester (for fun and for-profit).

Trainer Biography:

Rod Soto has over 15 years of experience in information technology and security. He has spoken at ISSA, ISC2, OWASP, RSA, DerbyCon,BlackHat, DEFCON, Hackmiami, Bsides and also been featured in Rolling Stone Magazine, Pentest Magazine, Univision, VICE and CNN. Rod Soto was the winner of the 2012 BlackHat Las vegas CTF competition and is the founder and lead developer of the Kommand && KonTroll/ NOQRTRCTF competitive hacking Tournament series.

bottom of page