Course Outline

Penetration Testing Process and Types

Vulnerability Assessment

Red Team skills

Penetration Testing Methodologies

Penetration Testing Tools

Metasploit Framework

Internal and External Network Penetration Testing

Firewall Penetration Testing

Windows Penetration Testing

Linux Penetration Testing

Web Application Penetration Testing

Database Penetration Testing

Physical Security Penetration Testing

Data Center Penetration Testing

Cloud Penetration Testing

Penetration Testing Reporting

Penetration Testing Reporting, do's and dont's

Capture the Flag lab

Requirements

A firm understanding of TCP/IP Protocals is required to attend this course and ideally some prior experience and/or training in Ethical hacking methods.

Please note that programming experience is not required.

  35 Hours
 

Number of participants


Starts

Ends


Dates are subject to availability and take place between 09:30 and 16:30.
Open Training Courses require 5+ participants.

Testimonials (3)

Related Courses

CISA - Certified Information Systems Auditor

  28 Hours

Related Categories