Security Consultant and Trainer Joe McCray has been hacking into the Department of Defense (DoD), Federal Agencies, Financial Institutions, and other big companies for years - legally of course. He's a Penetration Tester, a term used to describe a computer security consultant that hacks into companies in order to demonstrate security weaknesses.

He helps companies identify and fix vulnerabilities that could lead to catastrophic security breaches - he routinely gains access to thousands of bank accounts, credit card numbers, social security numbers, and company trade secrets.

Because of Joe's unique experience penetration testing DoD, Federal Agencies, Financial Institutions, and other large companies he is frequently sought out as a trainer. People want to know how he consistently bypasses common IT Security mechanisms such as Firewalls, Anti-Virus, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Network Access Control (NAC), Web Application Firewalls (WAF), etc.

Joe has recently developed a course to teach IT and IT Security professionals how hackers break into systems and bypass these common security mechanisms. There are lots of courses on the market that claim to do this. Joe says, "I developed the Advanced Penetration Testing course because there were too many security courses out there that are written and taught by people that haven't actually been pentesters. These teachers are reading word for word from old computer security books and teaching the students hacks that are ten years old. That kind of teaching is fine if you just want to introduce someone to our field and raise awareness, but it does nothing to help people working in the DoD, Federal Agencies, Financial Institutions, and other large companies secure critical systems from attack. "

Advanced Penetration Testing (APT): Pentesting High Security Environments is a course that focuses on attacking and defending highly secured environments such as 3-letter agencies, DoD, financial organizations, federal organizations, and large companies. This course that can be taken as either a five-day course, or a two-day workshop at a security conference.

This is not your normal Ethical Hacking course. This is not a "death by powerpoint" course. You won't be attacking unpatched Windows 2000 Servers, and you won't be learning a bunch of outdated tools like most Ethical Hacking courses.

The link for this article located at PR Web is no longer available.