[vc_row][vc_column][vc_single_image image=”9023″ img_size=”full” css_animation=”none”][/vc_column][/vc_row][vc_row][vc_column width=”1/3″][vc_custom_heading text=”Award Winning Podcasts” font_container=”tag:h1|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal”][/vc_column][vc_column width=”1/3″][vc_custom_heading text=”Renowned Pen-Test Gear” font_container=”tag:h1|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal”][/vc_column][vc_column width=”1/3″][vc_custom_heading text=”Immersive InfoSec Training” font_container=”tag:h1|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal”][/vc_column][/vc_row][vc_row][vc_column][vc_empty_space height=”64px”][vc_single_image image=”9768″ img_size=”full”][vc_custom_heading text=”We love to hack, and we’re inspired by the open & supportive nature of the hacker culture.” font_container=”tag:h2|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal”][vc_custom_heading text=”At Hak5 we’re committed to elevating the information security industry, by educating, equipping and encouraging this all-inclusive community – one where all hackers belong.” font_container=”tag:h2|text_align:center” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal”][vc_empty_space height=”96px”][vc_custom_heading text=”Hak5 Gear” font_container=”tag:h1|text_align:left” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal”][vc_separator][vc_single_image image=”9520″ img_size=”full”][vc_column_text]Hak5 Gear has found its way into the hearts and tool-kits of the modern hacker. Most notable for their ease of use, devices like the Rubber Ducky, WiFi Pineapple and Bash Bunny stay true to our design philosophy – make it do the thing. From wireless auditing to clandestine remote access and physical access mayhem, Hak5 Gear have you covered. It’s no surprise they’ve been featured by the likes of Mr Robot, Silicon Valley and Jason Bourne.[/vc_column_text][vc_empty_space height=”96px”][vc_custom_heading text=”Hak5 Shows” font_container=”tag:h1|text_align:left” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal”][vc_separator][vc_single_image image=”9470″ img_size=”full” css_animation=”top-to-bottom”][vc_column_text]Beginning in 2005 as the self-titled podcast, Hak5 is the flagship show of the network. The weekly show airs on YouTube and syndicates via Discovery Digital Networks (formerly Revision3) covering everything from open source software and network infrastructure to penetration testing. Hak5 is complimented by sister shows HakTip, ThreatWire, Metasploit Minute and TekThing.[/vc_column_text][vc_empty_space height=”96px”][vc_custom_heading text=”Hak5 Training” font_container=”tag:h1|text_align:left” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal”][vc_separator][/vc_column][/vc_row][vc_row][vc_column][vc_single_image image=”8380″ img_size=”full” css_animation=”top-to-bottom”][vc_column_text]Unlike any other information security training, Pentest with Hak5 takes you on an immersive hacking adventure. As a member of an elite red team, you’re armed with the tools of trade and training throughout a simulated engagement. Go toe-to-toe against a host of hostile network adversaries and walk away with the knowledge to exploit our most powerful penetration testing tools.[/vc_column_text][/vc_column][/vc_row]