Course Outline
- Scoping Organizational/Customer Requirements
- Defining theRules of Engagement
- Footprinting andGathering Intelligence
- EvaluatingHuman and PhysicalVulnerabilities
- Preparing theVulnerability Scan
- Scanning Logical Vulnerabilities
- Analyzing Scanning Results
- AvoidingDetection and Covering Tracks
- Exploiting the LAN and Cloud
- Testing Wireless Networks
- Targeting Mobile Devices
- Attacking Specialized Systems
- Web Application-Based Attacks
- Performing System Hacking
- Scripting and Software Development
- Leveraging the Attack: Pivot and Penetrate
- Communicating During the PenTesting Process
- Summarizing Report Components
- Recommending Remediation
- Performing Post-Report Delivery Activities
Requirements
Recommended CompTIA Network+, Security+ or equivalent knowledge.
Testimonials (6)
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us
Raheal Akhtar - Dubai Government Human Resources Department
Course - Certified Ethical Hacker
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
A wide range of knowledge of the lecturer.