P Testing Course-2

Course Description:

Our Introduction to Penetration Testing Course is for anyone who has started in the security work field and wants to learn more about penetration testing, or those who find it difficult to present findings properly into a report or presentation.

In this course you will learn about more than just technical tooling. You'll learn everything you need to know in order to perform your first penetration test, from setting the scope to presenting to stakeholders.We will also discuss parts of risk management, how to write a good report and how to do false positive reduction.

Course Outline:

We'll go from top to bottom, covering a variety of topics including:

  • Setting scopes
  • Creating statements of work
  • Performing recon
  • Taking action at the target itself
  • Reducing false positives
  • Writing reports
  • Building a good structure
  • Presenting data to stakeholders in a summary meeting


Ready to get started? You can watch the full course by logging into your All Access Pass Members Account!

Watch Now!



Tim Thurlings
About Tim Thurlings

Ever since I was a little boy, I loved playing with computers, taking them apart and trying to improve them. I have always been intrigued by how a human made those things work, so I wanted to do that too. Break in order to make it better. All I ever wanted was to make the world a better place, or at least try to help making people better. I even attended medical school, making people better in the most literal sense of the word. That didn’t work out for me. I’ve been fortunate to work around the globe since and met a lot of amazing people who all helped me growing my vision. I believe that machines can help us, autonomously. These machines will reduce the impact of outbreaks by limiting the operational window of the attack. Prevention? No, we cannot prevent outbreaks, ever. There is always that next new thing. Reduce the window of opportunity for these attacks to spread? Yes, as close to zero as possible. I believe in a network that helps humans to achieve their dreams, not vice versa. Why? It is simple. I do not want to be bothered by attacks not aimed at me. I don’t want to be collateral damage. When I order stuff from China, I expect the vessel or plane that carries my package to arrive fast and safely, without being disturbed by a cyber-attack. And I believe this is possible. We can make people better, all we need is each other to make it happen. I turn my words into actions with my courses and writings here at INE and by working with Bluedog Security Monitoring.

Subscribe to INE Blog Updates

New Blog Posts!