Course Outline

  • Scoping Organizational/Customer Requirements
  • Defining theRules of Engagement
  • Footprinting andGathering Intelligence
  • EvaluatingHuman and PhysicalVulnerabilities
  • Preparing theVulnerability Scan
  • Scanning Logical Vulnerabilities
  • Analyzing Scanning Results
  • AvoidingDetection and Covering Tracks
  • Exploiting the LAN and Cloud
  • Testing Wireless Networks
  • Targeting Mobile Devices
  • Attacking Specialized Systems
  • Web Application-Based Attacks
  • Performing System Hacking
  • Scripting and Software Development
  • Leveraging the Attack: Pivot and Penetrate
  • Communicating During the PenTesting Process
  • Summarizing Report Components
  • Recommending Remediation
  • Performing Post-Report Delivery Activities

Requirements

Recommended CompTIA Network+, Security+ or equivalent knowledge.

 35 Hours

Number of participants



Price per participant

Testimonials (8)

Related Courses

CRISC - Certified in Risk and Information Systems Control

21 Hours

Android Security

14 Hours

Comprehensive C# and .NET Application Security

21 Hours

Network Security and Secure Communication

21 Hours

Combined C/C++, JAVA and Web Application Security

28 Hours

Application Security in the Cloud

21 Hours

Related Categories