Get in Touch

Course Outline

Core Modules:

  1. Rationale for Security Analysis
  2. TCP/IP Packet Analysis
  3. Penetration Testing Methodologies
  4. Client and Legal Agreements
  5. Rules of Engagement
  6. Planning and Scheduling Penetration Tests
  7. Pre-Test Procedures
  8. Information Gathering
  9. Vulnerability Analysis
  10. External Penetration Testing
  11. Internal Network Penetration Testing
  12. Firewall Penetration Testing
  13. IDS Penetration Testing
  14. Password Cracking Penetration Testing
  15. Social Engineering Penetration Testing
  16. Web Application Penetration Testing
  17. SQL Penetration Testing
  18. Penetration Testing Reports and Post-Test Actions

Additional Modules:

  1. Router and Switch Penetration Testing
  2. Wireless Network Penetration Testing
  3. Denial-of-Service Penetration Testing
  4. Penetration Testing of Stolen Laptops, PDAs, and Mobile Phones
  5. Source Code Penetration Testing
  6. Physical Security Penetration Testing
  7. Surveillance Camera Penetration Testing
  8. Database Penetration Testing
  9. VoIP Penetration Testing
  10. VPN Penetration Testing
  11. Cloud Penetration Testing
  12. Virtual Machine Penetration Testing
  13. War Dialing
  14. Virus and Trojan Detection
  15. Log Management Penetration Testing
  16. File Integrity Checking
  17. Mobile Device Penetration Testing
  18. Telecommunication and Broadband Communication Penetration Testing
  19. Email Security Penetration Testing
  20. Security Patch Penetration Testing
  21. Data Leakage Penetration Testing
  22. SAP Penetration Testing
  23. Standards and Compliance
  24. Information System Security Principles
  25. Information System Incident and Response
  26. Information System Auditing and Certification

Requirements

No prerequisites are required.

 35 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories