Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
- Scoping Organizational/Customer Requirements
- Defining the Rules of Engagement
- Footprinting and Gathering Intelligence
- Evaluating Human and Physical Vulnerabilities
- Preparing the Vulnerability Scan
- Scanning Logical Vulnerabilities
- Analyzing Scanning Results
- Avoiding Detection and Covering Tracks
- Exploiting the LAN and Cloud
- Testing Wireless Networks
- Targeting Mobile Devices
- Attacking Specialized Systems
- Web Application-Based Attacks
- Performing System Hacking
- Scripting and Software Development
- Leveraging the Attack: Pivot and Penetrate
- Communicating During the PenTesting Process
- Summarizing Report Components
- Recommending Remediation
- Performing Post-Report Delivery Activities
Requirements
Recommended CompTIA Network+, Security+ or equivalent knowledge.
35 Hours