Course Outline

  • Scoping Organizational/Customer Requirements
  • Defining theRules of Engagement
  • Footprinting andGathering Intelligence
  • EvaluatingHuman and PhysicalVulnerabilities
  • Preparing theVulnerability Scan
  • Scanning Logical Vulnerabilities
  • Analyzing Scanning Results
  • AvoidingDetection and Covering Tracks
  • Exploiting the LAN and Cloud
  • Testing Wireless Networks
  • Targeting Mobile Devices
  • Attacking Specialized Systems
  • Web Application-Based Attacks
  • Performing System Hacking
  • Scripting and Software Development
  • Leveraging the Attack: Pivot and Penetrate
  • Communicating During the PenTesting Process
  • Summarizing Report Components
  • Recommending Remediation
  • Performing Post-Report Delivery Activities

Requirements

Recommended CompTIA Network+, Security+ or equivalent knowledge.

  35 Hours

Testimonials (6)

Related Courses

CRISC - Certified in Risk and Information Systems Control

  21 Hours

Cloud Computing Security Knowledge (CCSK) Preparation Course

  21 Hours

Related Categories