Course Outline

  • Scoping Organizational/Customer Requirements
  • Defining theRules of Engagement
  • Footprinting andGathering Intelligence
  • EvaluatingHuman and PhysicalVulnerabilities
  • Preparing theVulnerability Scan
  • Scanning Logical Vulnerabilities
  • Analyzing Scanning Results
  • AvoidingDetection and Covering Tracks
  • Exploiting the LAN and Cloud
  • Testing Wireless Networks
  • Targeting Mobile Devices
  • Attacking Specialized Systems
  • Web Application-Based Attacks
  • Performing System Hacking
  • Scripting and Software Development
  • Leveraging the Attack: Pivot and Penetrate
  • Communicating During the PenTesting Process
  • Summarizing Report Components
  • Recommending Remediation
  • Performing Post-Report Delivery Activities

Requirements

Recommended CompTIA Network+, Security+ or equivalent knowledge.

 35 Hours

Number of participants



Price per participant

Testimonials (7)

Related Courses

CRISC - Certified in Risk and Information Systems Control

21 Hours

Cloud Computing Security Knowledge (CCSK) Preparation Course

21 Hours

Standard Java Security

14 Hours

Java and Web Application Security

21 Hours

Related Categories