logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

Penetration Testing: Procedures and Methodologies

SS Course: 2001233

Course Overview

TOP

This course is designed to expose students to groundbreaking methodologies in conducting thorough information security analysis, as well as advanced penetration testing techniques. Through expert lecture and interactive exercises, students will be able to perform the intensive assessments required to effectively identify and mitigate risks to the security of the organization's infrastructure.

                                                                  

Scheduled Classes

TOP

What You'll Learn

TOP

Our Penetration Testing: Procedures & Methodologies course will cover the following topics in depth: methodologies, legal aspects, planning and scheduling, external and internal penetration testing, firewall and ids penetration testing as well as penetration testing of laptops, PDA's, cellphones, e-mail, and security patches.

Outline

TOP
Viewing outline for:
  • Introduction to Penetration Testing
  • Standards
  • Cryptography
  • Reconnaissance
  • Malware
  • Hacking Windows
  • Web Hacking
  • Vulnerability Scanning
  • Introduction to Linux
  • Linux Hacking
  • Introduction to Kali Linux
  • General Hacking Techniques
  • Introduction to Metasploit
  • More with Metasploit
  • Introduction to Scripting with Ruby
  • General Hacking Knowledge
  • Additional Pen Testing Topics
  • A Sample Pen Test Project

Prerequisites

TOP

Before attending this course, students should have knowledge of the skills imparted in:

  • EC-Council Certified Ethical Hacker (CEH)
  • Certified Security Analyst (ECSA) training courses

    Who Should Attend

    TOP

    This course is intended for:

    • Security officers
    • Security auditors 
    • Security professionals 
    • Site administrators 
    • Government and military workers who need to meet IA training requirements 

    Next Step Courses

    TOP