Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
- Scoping Organizational/Customer Requirements
- Defining theRules of Engagement
- Footprinting andGathering Intelligence
- EvaluatingHuman and PhysicalVulnerabilities
- Preparing theVulnerability Scan
- Scanning Logical Vulnerabilities
- Analyzing Scanning Results
- AvoidingDetection and Covering Tracks
- Exploiting the LAN and Cloud
- Testing Wireless Networks
- Targeting Mobile Devices
- Attacking Specialized Systems
- Web Application-Based Attacks
- Performing System Hacking
- Scripting and Software Development
- Leveraging the Attack: Pivot and Penetrate
- Communicating During the PenTesting Process
- Summarizing Report Components
- Recommending Remediation
- Performing Post-Report Delivery Activities
Requirements
Recommended CompTIA Network+, Security+ or equivalent knowledge.
35 Hours