Get in Touch

Course Outline

Core modules:

  1. Understanding the Need for Security Analysis
  2. Analyzing TCP/IP Packets
  3. Methodologies for Penetration Testing
  4. Client Relations and Legal Agreements
  5. Rules of Engagement
  6. Planning and Scheduling Penetration Tests
  7. Pre-Testing Procedures
  8. Information Gathering
  9. Vulnerability Analysis
  10. External Penetration Testing
  11. Internal Network Penetration Testing
  12. Firewall Penetration Testing
  13. Intrusion Detection System (IDS) Penetration Testing
  14. Password Cracking Techniques
  15. Social Engineering Penetration Testing
  16. Web Application Penetration Testing
  17. SQL Injection Penetration Testing
  18. Generating Penetration Test Reports and Post-Test Actions

Additional Modules:

  1. Router and Switch Penetration Testing
  2. Wireless Network Penetration Testing
  3. Denial-of-Service (DoS) Penetration Testing
  4. Testing Stolen Laptops, PDAs, and Mobile Phones
  5. Source Code Penetration Testing
  6. Physical Security Penetration Testing
  7. Surveillance Camera Penetration Testing
  8. Database Penetration Testing
  9. VoIP Penetration Testing
  10. VPN Penetration Testing
  11. Cloud Infrastructure Penetration Testing
  12. Virtual Machine Penetration Testing
  13. Wardriving
  14. Virus and Trojan Detection
  15. Log Management Penetration Testing
  16. File Integrity Checking
  17. Mobile Device Penetration Testing
  18. Telecommunication and Broadband Penetration Testing
  19. Email Security Penetration Testing
  20. Security Patch Penetration Testing
  21. Data Leakage Penetration Testing
  22. SAP Penetration Testing
  23. Standards and Compliance
  24. Information System Security Principles
  25. Information System Incident Response
  26. Information System Auditing and Certification

Requirements

No prerequisites are required.

 35 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories