Course Outline

Penetration Testing Process and Types

Vulnerability Assessment

Red Team skills

Penetration Testing Methodologies

Penetration Testing Tools

Metasploit Framework

Internal and External Network Penetration Testing

Firewall Penetration Testing

Windows Penetration Testing

Linux Penetration Testing

Web Application Penetration Testing

Database Penetration Testing

Physical Security Penetration Testing

Data Center Penetration Testing

Cloud Penetration Testing

Penetration Testing Reporting

Penetration Testing Reporting, do's and dont's

Capture the Flag lab

Requirements

A firm understanding of TCP/IP Protocals is required to attend this course and ideally some prior experience and/or training in Ethical hacking methods.

Please note that programming experience is not required.

 35 Hours

Number of participants



Price per participant

Testimonials (1)

Related Courses

IBM Qradar SIEM: Beginner to Advanced

14 Hours

Micro Focus ArcSight ESM Advanced

35 Hours

CCTV Security

14 Hours

CipherTrust Manager

21 Hours

CISA - Certified Information Systems Auditor

28 Hours

CISMP - Certificate in Information Security Management Principles

21 Hours

Computer Room Security and Maintenance

14 Hours

Mastering Continuous Threat Exposure Management (CTEM)

28 Hours

Cybersecurity Fundamentals

28 Hours

DevOps Security: Creating a DevOps Security Strategy

7 Hours

Honeywell Security System

14 Hours

Building up information security according to ISO 27005

21 Hours

Applying Psychological Science to Law Enforcement

14 Hours

NB-IoT for Developers

7 Hours

Open Authentication (OAuth)

7 Hours

Related Categories

1