We will not teach you how to run Nessus and Nmap, nor tell you to have a SNMP policy.

We will teach you to write exploits and how to attack.

Education Overview

Immunity training is not just the standard assortment of Ethical Hacking, Penetration Testing, and Vulnerability Assessment courses. We will not teach you how to run Nessus and Nmap, nor will we tell you that you should have a policy against SNMP on your network. We will teach you how to write exploits — capitalizing on Immunity's world renowned expertise in offensive security.

Virtual CANVAS Training is taught remotely; all other courses are taught face-to-face: Web Hacking, Java Exploitation, Click Here For Ring0 and the Master Class.

All of Immunity's training courses offer Continuing Professional Education (CPE) credits.
If you are interested in earning credits, just let Immunity know in advance.
View the CPE Table below for more information.

VIRTUAL CANVAS TRAINING

Whether you are considering adding CANVAS to your tool-set or you are a current user, Immunity’s Virtual Canvas Training will give you an environment dedicated to bringing your knowledge and use of CANVAS to new heights.

Spend some time with us while we help you work on target selections and show you what CANVAS can do in different operating systems. Since this two-day course is taught by one of our senior engineers conveniently at your home or office via WebEx, every CANVAS user should grab this class along with their new license or renewal.

  • This course is taught remotely.
  • 10 potential CPE credits available.
▶ Learn More

WEB HACKING

Immunity's Web Hacking class has a heavy emphasis with hands-on-learning, going in-depth on XSS, SQLi, XXE and Web Crypto. The token system has been improved from previous years, which allows us to track how each individual student is performing in class and indicates if a student could use extra help with a particular subject. The token system also allows for students to compete for the top score (often for fabulous prizes). Come to Web Hacking and receive instruction from members of Immunity's senior consulting team!

  • This course is taught on location.
  • 28 potential CPE credits available.
▶ Learn More

JAVA EXPLOITATION

This class will cover auditing modern Java applications, exploiting vulnerabilities from a wide variety of vulnerability classes. From the home desktop, to the enterprise, Java is consistently present in ways you would not expect it to be. This class will teach you how to take advantage of the insidious layer of Java bubbling through the cracks of the modern enterprise attack surface.

  • This course is taught on location.
  • 21 potential CPE credits available.
▶ Learn More

CLICK HERE FOR RING0

Immunity's Click here for ring0 class teaches both Windows clientside exploitation as well as Windows kernel exploitation. These two combined courses complement each other perfectly through hands-on exploitation that takes the student from gaining remote access to elevating privileges on modern Windows systems. This is an intermediate class that requires a solid grasp of userland and kernel debugging on Windows platforms.

  • This course is taught on location.
  • 28 potential CPE credits available.
▶ Learn More

APPLIED CRYPTANALYSIS

The Immunity Cryptanalysis class takes traditionally dense Academic cryptanalytic theory and presents it in a practical way. The course relates each topic to practical examples. As students progress through the course they will take away real world cryptanalytic skills they can start employing immediately. Students learn to effectively recognize and exploit weakly implemented cryptography based on real world examples. More importantly, students will learn a methodology for expanding their own cryptanalytic prowess by learning to use a practical cryptanalytic tool chain. This course sets experienced vulnerability researchers up with the base they need to expand into the world of flawed cryptography.

  • This course is taught on location.
  • 28 potential CPE credits available.
▶ Learn More

LINUX KERNEL EXPLOITATION

The Immunity Linux Kernel Exploitation class focuses on modern exploit development and vulnerability discovery techniques. Intermediate to advanced exploit development skills are recommended for students wishing to take this class.

  • This course is taught on location.
  • 28 potential CPE credits available.
▶ Learn More

(ISC)2 CPE CREDIT INFORMATION

All of Immunity's training courses offer Continuing Professional Education (CPE) credits.
If you are interested in earning credits, just let Immunity know in advance.

COURSE * CPE CREDITS CERTIFICATIONS
Virtual Canvas Training (VCT) 10 CISSP
Java Exploitation 21 CISSP, CSSLP, SSCP
Web Hacking 28 CISSP, CSSLP, SSCP
Click Here For Ring0 28 CISSP, CSSLP, SSCP
Applied Cryptanalysis 28 CISSP, CSSLP, SSCP
Linux Kernel Exploitation 28 CISSP, CSSLP, SSCP

* Total potential credits

LATEST IN

IMMUNITYMEDIA

TWITTER
VIDEOS
PRODUCT
BLOG
SERVICES
BLOG