Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Core modules:
- Understanding the Need for Security Analysis
- Analyzing TCP/IP Packets
- Methodologies for Penetration Testing
- Client Relations and Legal Agreements
- Rules of Engagement
- Planning and Scheduling Penetration Tests
- Pre-Testing Procedures
- Information Gathering
- Vulnerability Analysis
- External Penetration Testing
- Internal Network Penetration Testing
- Firewall Penetration Testing
- Intrusion Detection System (IDS) Penetration Testing
- Password Cracking Techniques
- Social Engineering Penetration Testing
- Web Application Penetration Testing
- SQL Injection Penetration Testing
- Generating Penetration Test Reports and Post-Test Actions
Additional Modules:
- Router and Switch Penetration Testing
- Wireless Network Penetration Testing
- Denial-of-Service (DoS) Penetration Testing
- Testing Stolen Laptops, PDAs, and Mobile Phones
- Source Code Penetration Testing
- Physical Security Penetration Testing
- Surveillance Camera Penetration Testing
- Database Penetration Testing
- VoIP Penetration Testing
- VPN Penetration Testing
- Cloud Infrastructure Penetration Testing
- Virtual Machine Penetration Testing
- Wardriving
- Virus and Trojan Detection
- Log Management Penetration Testing
- File Integrity Checking
- Mobile Device Penetration Testing
- Telecommunication and Broadband Penetration Testing
- Email Security Penetration Testing
- Security Patch Penetration Testing
- Data Leakage Penetration Testing
- SAP Penetration Testing
- Standards and Compliance
- Information System Security Principles
- Information System Incident Response
- Information System Auditing and Certification
Requirements
No prerequisites are required.
35 Hours
Testimonials (3)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
Overview of Risk topics and preparing for exam