Course Outline

Penetration Testing Process and Types

Vulnerability Assessment

Red Team skills

Penetration Testing Methodologies

Penetration Testing Tools

Metasploit Framework

Internal and External Network Penetration Testing

Firewall Penetration Testing

Windows Penetration Testing

Linux Penetration Testing

Web Application Penetration Testing

Database Penetration Testing

Physical Security Penetration Testing

Data Center Penetration Testing

Cloud Penetration Testing

Penetration Testing Reporting

Penetration Testing Reporting, do's and dont's

Capture the Flag lab


A firm understanding of TCP/IP Protocals is required to attend this course and ideally some prior experience and/or training in Ethical hacking methods.

Please note that programming experience is not required.

  35 Hours


Related Courses

IBM Qradar SIEM: Beginner to Advanced

  14 hours

CISMP - Certificate in Information Security Management Principles

  21 hours

CISM - Certified Information Security Manager

  28 hours

CISA - Certified Information Systems Auditor

  28 hours

Cybersecurity Fundamentals

  28 hours

Public Key Infrastructure

  21 hours

Building up information security according to ISO 27005

  21 hours

DevOps Security: Creating a DevOps Security Strategy

  7 hours

NB-IoT for Developers

  7 hours

Computer Room Security and Maintenance

  14 hours

Security Policy Management

  35 hours

Open Data Risk Analysis and Management

  21 hours

Open Authentication (OAuth)

  7 hours

Honeywell Security System

  14 hours

Security Management

  14 hours