SANS GIAC Certified Penetration Tester (GPEN)
Recently, I took a great training program from SANS to sharpen my existing I.T. security skills. This class specifically dealt with performing network penetration tests. As of yesterday, I have taken and passed the GPEN certification exam. So, now I am officially a SANS GIAC Certified Penetration Tester (GPEN). Most of you in the I.T. community are probably familiar with SANS, and possibly familiar with this certification.
For those of you who are not, here is what this is all about in short. Most organizations have computer networks that contain sensitive information. One of the best ways to test the security of those networks is to perform a penetration test.
If you are an I.T. pro considering some I.T. security training, I would strongly recommend SANS. I have taken a lot of I.T. training, and gathered a lot of I.T. certifications in the past (MCP, MCSE, MCSE+I, MCT, RHCE, etc) and I can say with conviction that this is easily one of the best training programs I have ever taken. Here are a few reasons why.
- I took this course via the SANS VLive format. It was perfect for me. I was able to take these classes in the evenings, which worked great for my schedule. The class happens live, and you can interact with the instructors and other students via a shared chat session. The live interactions made the class much more engaging than your normal (painfully boring) web based training. However, if you did need to miss one of the sessions, you could watch the recorded version later. SANS has this delivery format nailed.
- The instructors (especially Ed Skoudis and John Strand ) are world class subject matter experts. Learning from these guys was simply great!
- The course content was packed with high value, relevant information which was delivered efficiently.
I would like to thank all of the great folks at SANS who helped to provide such a high quality program! I enjoyed it very much, and I am confident that I will be able to apply the information to benefit my clients in the future. Thanks again!