We will not teach you how to run Nessus and Nmap, nor tell you to have a SNMP policy.

We will teach you to write exploits and how to attack.

Education Overview

Immunity training is not just the standard assortment of Ethical Hacking, Penetration Testing, and Vulnerability Assessment courses. We will not teach you how to run Nessus and Nmap, nor will we tell you that you should have a policy against SNMP on your network. We will teach you how to write exploits — capitalizing on Immunity's world renowned expertise in offensive security.

Virtual CANVAS Training and Web Hacking Language Review are both taught remotely; all other courses are taught face-to-face: Web Hacking, Wide Open To Interpretation, Click Here For Ring0 and the Master Class.

All of Immunity's training courses offer Continuing Professional Education (CPE) credits.
If you are interested in earning credits, just let Immunity know in advance.
View the CPE Table below for more information.

VIRTUAL CANVAS TRAINING

Whether you are considering adding CANVAS to your tool-set or you are a current user, Immunity’s Virtual Canvas Training will give you an environment dedicated to bringing your knowledge and use of CANVAS to new heights.

Spend some time with us while we help you work on target selections and show you what CANVAS can do in different operating systems. Since this two-day course is taught by one of our senior engineers conveniently at your home or office via WebEx, every CANVAS user should grab this class along with their new license or renewal.

  • This course is taught remotely.
  • 10 potential CPE credits available.
▶ Learn More

WEB HACKING LANGUAGE REVIEW

Web application vulnerabilities like padding oracle can be difficult to get a handle on. This is doubly true if you're struggling with some of the underlying concepts and languages in use.The web hacking language review functions as an optional bolt on to the web hacking class or it can be taken as a stand-alone course.

  • This course is taught remotely.
  • 7 potential CPE credits available.
▶ Learn More

WEB HACKING

Immunity's Web Hacking class has a heavy emphasis with hands-on-learning, going in-depth on XSS, SQLi, XXE and Web Crypto. The token system has been improved from previous years, which allows us to track how each individual student is performing in class and indicates if a student could use extra help with a particular subject. The token system also allows for students to compete for the top score (often for fabulous prizes). Come to Web Hacking and receive instruction from members of Immunity's senior consulting team!

  • This course is taught on location.
  • 28 potential CPE credits available.
▶ Learn More

WIDE OPEN TO INTERPRETATION

This class will cover auditing modern Java applications, exploiting vulnerabilities from a wide variety of vulnerability classes. From the home desktop, to the enterprise, Java is consistently present in ways you would not expect it to be. This class will teach you how to take advantage of the insidious layer of Java bubbling through the cracks of the modern enterprise attack surface.

  • This course is taught on location.
  • 21 potential CPE credits available.
▶ Learn More

CLICK HERE FOR RING0

Immunity's Click here for ring0 class teaches both Windows clientside exploitation as well as Windows kernel exploitation. These two combined courses complement each other perfectly through hands-on exploitation that takes the student from gaining remote access to elevating privileges on modern Windows systems. This is an intermediate class that requires a solid grasp of userland and kernel debugging on Windows platforms.

  • This course is taught on location.
  • 28 potential CPE credits available.
▶ Learn More

MASTER TRACK: APPLIED CRYPTANALYSIS

The Immunity Cryptanalysis class takes traditionally dense Academic cryptanalytic theory and presents it in a practical way. The course relates each topic to practical examples. As students progress through the course they will take away real world cryptanalytic skills they can start employing immediately. Students learn to effectively recognize and exploit weakly implemented cryptography based on real world examples. More importantly, students will learn a methodology for expanding their own cryptanalytic prowess by learning to use a practical cryptanalytic tool chain. This course sets experienced vulnerability researchers up with the base they need to expand into the world of flawed cryptography.

  • This course is taught on location.
  • 28 potential CPE credits available.
▶ Learn More

MASTER TRACK: KERNEL EXPLOITATION

The Immunity Kernel Exploitation Master Track focuses on modern exploit development and vulnerability discovery techniques. Intermediate to advanced exploit development skills are recommended for students wishing to take this class.

  • This course is taught on location.
  • 28 potential CPE credits available.
▶ Learn More

(ISC)2 CPE CREDIT INFORMATION

All of Immunity's training courses offer Continuing Professional Education (CPE) credits.
If you are interested in earning credits, just let Immunity know in advance.

COURSE * CPE CREDITS CERTIFICATIONS
Virtual Canvas Training (VCT) 10 CISSP
Web Hacking Language Review 7 CISSP, CSSLP, SSCP
Wide Open To Interpretation 21 CISSP, CSSLP, SSCP
Web Hacking 28 CISSP, CSSLP, SSCP
Click Here For Ring0 28 CISSP, CSSLP, SSCP
Master Track: Applied Cryptanalysis 28 CISSP, CSSLP, SSCP
Master Track: Kernel Exploitation 28 CISSP, CSSLP, SSCP

* Total potential credits

LATEST IN

IMMUNITYMEDIA

TWITTER
VIDEOS
PRODUCT
BLOG
SERVICES
BLOG