Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Core modules:
- Understanding the Need for Security Analysis
- TCP/IP Packet Analysis
- Penetration Testing Methodologies
- Customer and Legal Agreements
- Rules of Engagement
- Planning and Scheduling Penetration Tests
- Pre-Penetration Testing Steps
- Information Gathering
- Vulnerability Analysis
- External Penetration Testing
- Internal Network Penetration Testing
- Firewall Penetration Testing
- IDS Penetration Testing
- Password Cracking Penetration Testing
- Social Engineering Penetration Testing
- Web Application Penetration Testing
- SQL Penetration Testing
- Post-Testing Actions and Reporting
Additional Modules:
- Router and Switch Penetration Testing
- Wireless Network Penetration Testing
- Denial-of-Service Penetration Testing
- Penetration Testing of Stolen Laptops, PDAs, and Cell Phones
- Source Code Penetration Testing
- Physical Security Penetration Testing
- Surveillance Camera Penetration Testing
- Database Penetration Testing
- VoIP Penetration Testing
- VPN Penetration Testing
- Cloud Penetration Testing
- Virtual Machine Penetration Testing
- Wardialing
- Virus and Trojan Detection
- Log Management Penetration Testing
- File Integrity Checking
- Mobile Device Penetration Testing
- Telecommunication and Broadband Communication Penetration Testing
- Email Security Penetration Testing
- Security Patches Penetration Testing
- Data Leakage Penetration Testing
- SAP Penetration Testing
- Standards and Compliance
- Information System Security Principles
- Information System Incident Response
- Information System Auditing and Certification
Requirements
There are no prerequisites for this course.
35 Hours
Testimonials (1)
Overview of Risk topics and preparing for exam