Real World, Performance-Based Information Security Training


Our unique performance-based, hands-on information security training programs are the most well respected in the security industry, for a good reason. You see, we have an extensive background in ethical hacking training, as well as an intimate involvement in the information security community. we know security, and are pretty good at teaching it too. Here’s why.

Penetration Testing with Kali (PWK) is a classroom pen testing course designed for network administrators and security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This unique penetration testing training course introduces students to the latest ethical hacking tools and techniques. Penetration Testing with Kali Linux simulates a full penetration test from start to finish, by injecting the student into a target-rich, diverse, and vulnerable network environment.

Penetration Testing with Kali Linux is a foundational security course, but still requires students to have certain knowledge prior to attending the classroom training class. A solid understanding of TCP/IP, networking, and reasonable Linux skills are required. Familiarity with Bash scripting along with basic Perl or Python is considered a plus. This advanced penetration testing course is not for the faint of heart; it requires practice, testing, and the ability to want to learn in a manner that will grow your career in the information security field and overcome any learning plateau.Dot Com Systems challenges you to rise above the rest, dive into the fine arts of advanced penetration testing.



  1. Penetration Testing: What You Should Know
  2. The Essential Tools
  3. Passive Information Gathering
  4. Vulnerability Scanning
  5. Buffer Overflows
  6. Web Application Attacks
  7. The Metasploit Framework