This course is designed for anyone interested in learning how an attacker uses Google Hacking to get the information by exploiting various vulnerabilities available. Learn how easily an attacker can get information, including username and passwords, different sensitive company data, and exploit the system’s weaknesses.
To see prices please register or contact your certification consultant.
Custom configured devices are available. Please contact your certification consultants for details or click on the device request button below. For stock device configuration please click here.
Happy to call and help you with any questions and pricing. Please let us know which course & device platform you’re interested in, and the best time to call. Talk to you soon.
We are happy to help with your pricing questions. Please fill out the form below we’ll get right back to you with a quote. Thanks for considering us for your training needs.
Refer a friend or colleague and earn 100 SkillPoints! per person referred.
Sign up to receive updates, promotions, and sneak peaks of upcoming products. Plus 20% off your next order.