{"id":39801,"date":"2021-07-08T13:51:33","date_gmt":"2021-07-08T10:51:33","guid":{"rendered":"https:\/\/researcherstore.com\/?post_type=courses&p=39801"},"modified":"2021-07-08T14:41:37","modified_gmt":"2021-07-08T11:41:37","slug":"ethical-hacking-and-penetration","status":"publish","type":"courses","link":"https:\/\/researcherstore.com\/courses\/ethical-hacking-and-penetration\/","title":{"rendered":"Ethical Hacking and Penetration Testing part 4"},"content":{"rendered":"
In this course, you will learn how to prepare, execute a pen test, and how you should report your results in a way that will add value to your time and efforts.<\/p>\n
Join now<\/a><\/p>\n <\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":" Penetration is not an official partner or accredited training center of EC-Council. In this course, you will learn the ins and outs of planning and executing a penetration test against your own or your client\u2019s network. What\u2019s Pluralsight testing? Well, it\u2019s simple, as security professionals our job is to make it extremely difficult to get […]<\/p>\n","protected":false},"author":38,"featured_media":39802,"template":"","course-category":[207],"course-tag":[],"qubely_featured_image_url":{"full":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/images-\u062a\u062e\u0635\u064a\u0635-7.jpg",800,400,false],"landscape":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/images-\u062a\u062e\u0635\u064a\u0635-7.jpg",800,400,false],"portraits":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/images-\u062a\u062e\u0635\u064a\u0635-7.jpg",540,270,false],"thumbnail":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/images-\u062a\u062e\u0635\u064a\u0635-7.jpg",150,75,false],"medium":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/images-\u062a\u062e\u0635\u064a\u0635-7.jpg",300,150,false],"medium_large":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/images-\u062a\u062e\u0635\u064a\u0635-7.jpg",768,384,false],"large":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/images-\u062a\u062e\u0635\u064a\u0635-7.jpg",800,400,false],"1536x1536":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/images-\u062a\u062e\u0635\u064a\u0635-7.jpg",800,400,false],"2048x2048":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/images-\u062a\u062e\u0635\u064a\u0635-7.jpg",800,400,false],"qubely_landscape":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/images-\u062a\u062e\u0635\u064a\u0635-7.jpg",800,400,false],"qubely_portrait":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/images-\u062a\u062e\u0635\u064a\u0635-7.jpg",540,270,false],"qubely_thumbnail":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/images-\u062a\u062e\u0635\u064a\u0635-7.jpg",140,70,false],"woocommerce_thumbnail":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/images-\u062a\u062e\u0635\u064a\u0635-7-450x338.jpg",450,338,true],"woocommerce_single":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/images-\u062a\u062e\u0635\u064a\u0635-7-600x300.jpg",600,300,true],"woocommerce_gallery_thumbnail":["https:\/\/researcherstore.com\/wp-content\/uploads\/2021\/07\/images-\u062a\u062e\u0635\u064a\u0635-7-100x100.jpg",100,100,true]},"qubely_author":{"display_name":"ResearcherStore","author_link":"https:\/\/researcherstore.com\/user\/abuqamar\/"},"qubely_comment":0,"qubely_category":" I-Security Engineering<\/a>","qubely_excerpt":"Penetration is not an official partner or accredited training center of EC-Council. In this course, you will learn the ins and outs of planning and executing a penetration test against your own or your client\u2019s network. What\u2019s Pluralsight testing? Well, it\u2019s simple, as security professionals our job is to make it extremely difficult to get…","_links":{"self":[{"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/courses\/39801"}],"collection":[{"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/courses"}],"about":[{"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/types\/courses"}],"author":[{"embeddable":true,"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/users\/38"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/media\/39802"}],"wp:attachment":[{"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/media?parent=39801"}],"wp:term":[{"taxonomy":"course-category","embeddable":true,"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/course-category?post=39801"},{"taxonomy":"course-tag","embeddable":true,"href":"https:\/\/researcherstore.com\/wp-json\/wp\/v2\/course-tag?post=39801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}