Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
- Scoping Organizational/Customer Requirements
- Defining theRules of Engagement
- Footprinting andGathering Intelligence
- EvaluatingHuman and PhysicalVulnerabilities
- Preparing theVulnerability Scan
- Scanning Logical Vulnerabilities
- Analyzing Scanning Results
- AvoidingDetection and Covering Tracks
- Exploiting the LAN and Cloud
- Testing Wireless Networks
- Targeting Mobile Devices
- Attacking Specialized Systems
- Web Application-Based Attacks
- Performing System Hacking
- Scripting and Software Development
- Leveraging the Attack: Pivot and Penetrate
- Communicating During the PenTesting Process
- Summarizing Report Components
- Recommending Remediation
- Performing Post-Report Delivery Activities
Requirements
Recommended CompTIA Network+, Security+ or equivalent knowledge.
35 Hours
Testimonials (2)
Issues related to WAN from the provider's side, as well as dividing networks into subnets and routing
Pawel - Icotera
Course - CompTIA Network+ N10-008 exam prep with Exam (accredited training course with exam)
Machine Translated
Instructor's knowledge, practical experience, diversity of topics, and practical examples of applying new knowledge.
Kamil - Komenda Glowna Strazy Granicznej
Course - Testy penetracyjne – wykrywanie i wykorzystywanie podatności
Machine Translated