Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
- Scoping Organizational/Customer Requirements
- Defining theRules of Engagement
- Footprinting andGathering Intelligence
- EvaluatingHuman and PhysicalVulnerabilities
- Preparing theVulnerability Scan
- Scanning Logical Vulnerabilities
- Analyzing Scanning Results
- AvoidingDetection and Covering Tracks
- Exploiting the LAN and Cloud
- Testing Wireless Networks
- Targeting Mobile Devices
- Attacking Specialized Systems
- Web Application-Based Attacks
- Performing System Hacking
- Scripting and Software Development
- Leveraging the Attack: Pivot and Penetrate
- Communicating During the PenTesting Process
- Summarizing Report Components
- Recommending Remediation
- Performing Post-Report Delivery Activities
Requirements
Recommended CompTIA Network+, Security+ or equivalent knowledge.
35 Hours
Testimonials (2)
the way the trainer used to explain by drawing diagrams and not just going through the slides and reading from it.
Ibrahim Ghassal - Saudi Airlines
Course - CompTIA Network +
Trainer kept the topics interesting by adding real life scenarios