Intro to Cyber Security: Ethical Hacking / Penetration Testing Concepts

Event Information

Share this event

Date and Time




Bell Bank Building, 1st Floor Conference Room

3800 American Blvd West

Bloomington, MN 55431

Event description



This course is designed for both non-technical and technical people looking for a robust course on cyber security. The class is taught live with customized hands-on guidance and real life examples from our team of experienced cyber security experts. The goal of this course is to help you gain a basic understanding of the tools, processes and methods used by ethical hackers, penetration testers and incident responders. Both non-technical and technical people will walk out the door with the skills and knowledge to participate in and / or lead your own cyber teams more effectively. Throughout the training, we focus on the proper techniques to investigate, defend, test and document in legally defensible and ethical manner. For the more technical users, this course provides the foundation and preparation for the EC-Council Certified Ethical Hacker exam.

Every participant in our classes, of all skill levels, will have a lot of fun while learning critical skills and becoming better cyber citizens!

Training Time

This class is 4 days (Tuesday through Friday) 8:30 to 5 p.m. each day
(NOTE: Hands-on exercises are positioned throughout each day to reinforce specific skills and provide first-hand experience with the tools and results)

Course Learning Menu

PART ONE: Introduction to cyber security methods, tools, and incident handling

  • Introduction to Cyber Security and Cyber Law in the US
  • Introduction to Security Posture Assessments - ethical hackers, scanning penetration testing
  • Basics of a cyber attack: motives, goals, objectives, attack vectors and types of attacks
  • Introduction to incident management, incident response testing
  • The role of forensics and e-discovery in an adverse security event or data breach
  • Lab exercise: creating your own virtual lab environment, tools, and understanding a cyber lab essentials

PART TWO: System fundamentals

  • Network topologies, proxies and firewalls, intrusion prevention and detection systems, routers and switches
  • Operating systems: Microsoft, Mac OS, Android, Linux, and others
  • Intro to cryptography: how it works, hashing issues and limitations, applications
  • Lab exercise: Password cracking

PART THREE: Introduction to hacking methodologies: footprinting and reconnaissance scanning

  • Hacking methodologies / phases from reconnaissance to backdoors and covering tracks
  • Footprinting concepts and methodologies
  • Competitive intelligence gathering, gathering online information about a company, tracking online reputation of a company
  • Advanced Google hacking techniques
  • Email and domain level footprinting methods and tools
  • Basic social engineering tools, methods
  • Footprinting counter measures
  • Lab exercise: understanding the email header and email tracing, traceroute, Google and using open source tools for social media and DNS tracing

PART FOUR: Basic vulnerability and port scanning concepts, tools and NMap

  • Overview of network scanning, sniffing and packet captures
  • Tools and techniques: active, passive and semi-passive
  • Port scanning and Ping - seeing and understanding the results
  • Network discovery mapping tools
  • Understanding proxies
  • IP Spoofing
  • Vulnerability websites and resources
  • Enumeration definition and techniques for different operating systems
  • Lab exercise: Using NMap and network discovery open source tools

PART FIVE: Wireless Networks and Cloud Computing

  • Types, standards, configurations, WAPs
  • Tools for scanning and sniffing
  • Types of Cloud architectures
  • Security in the Cloud - what to look for and ask about
  • Performing security assessments Cloud infrastructue and applications
  • Lab exercise: Wireless packet capture

PART SIX: System hacking, disruption and penetration testing

  • Understand the goals and types of hacking
  • Password cracking methods, purposes and tools
  • Hacking mobile devices
  • DDoS
  • Penetration testing definition
  • Penetration testing tools; Metasploint demonstration
  • Lab exercise: Students can choose from an exercise from Part 6, repeat an exercise from an earlier section or perform a more advanced exercise from a concept already covered

We Will Provide

  • Training room and internet connections at Bloomington Office
  • Classroom, hands-on training simulation exercises
  • Workbooks and developed by EKP to help with after class examples and templates.
  • An over view and study "cheat sheet" for the Certified Ethical Hacker Exam v9
  • Continental Breakfast, box lunches, water and juice will be provided

Materials to Bring to Class and Things to Know!

  • Bring your own laptop so you will leave with the tools installed. Note: Company owned laptops may not let you install software or create virtual machine images
  • There is a cafe located near the training room that servers a full breakfast and has various soft drinks and snacks
  • There is free parking in the attached garage. There is a skyway to the building on the second level.


Keatron Evans is the primary trainer for this course. Keatron is a Partner at EKP and is also a certified instructor with ISC2 and InfoSec Institute. For bio information go to our web page at http://ekpartner.com/our-team/

What's the refund policy?

Full refunds are only available prior to July 1, 2017. Ticket substitutions are allows.

Special Requests

For special requests for diet or accommodations, email info@ekpartner.com and put "July 25 Training" in the subject line and indicate your requirements. Someone will be in contact to validate and ensure your requirements are met to the best of our ability.

Share with friends

Date and Time



Bell Bank Building, 1st Floor Conference Room

3800 American Blvd West

Bloomington, MN 55431

Save This Event

Event Saved