Course Outline
Penetration Testing Process and Types
Vulnerability Assessment
Red Team skills
Penetration Testing Methodologies
Penetration Testing Tools
Metasploit Framework
Internal and External Network Penetration Testing
Firewall Penetration Testing
Windows Penetration Testing
Linux Penetration Testing
Web Application Penetration Testing
Database Penetration Testing
Physical Security Penetration Testing
Data Center Penetration Testing
Cloud Penetration Testing
Penetration Testing Reporting
Penetration Testing Reporting, do's and dont's
Capture the Flag lab
Requirements
A firm understanding of TCP/IP Protocals is required to attend this course and ideally some prior experience and/or training in Ethical hacking methods.
Please note that programming experience is not required.
Testimonials
I liked the in-depth knowledge about the subject of the trainer, good explanation, highlighting important things!.
Andreas Rhein
The delivery
- Department for Communities
Depth and breadth of the course. Trainer was excellent also.
- Department for Communities
Examples provided
- Department for Communities
Trainer's vast knowledge
FUJITSU TECHNOLOGY SOLUTIONS SP. Z O.O.
Martin was very knowledgeable and gave really good tips; he allowed plenty of time for discussion and allowing us to ask questions. It was really well delivered, even virtually which sometimes is a difficult medium to work with.