Course Overview
TOPThis course is designed to expose students to groundbreaking methodologies in conducting thorough information security analysis, as well as advanced penetration testing techniques. Through expert lecture and interactive exercises, students will be able to perform the intensive assessments required to effectively identify and mitigate risks to the security of the organization's infrastructure.
Scheduled Classes
TOPWhat You'll Learn
TOPOur Penetration Testing: Procedures & Methodologies course will cover the following topics in depth: methodologies, legal aspects, planning and scheduling, external and internal penetration testing, firewall and ids penetration testing as well as penetration testing of laptops, PDA's, cellphones, e-mail, and security patches.
Outline
TOP- Introduction to Penetration Testing
- Standards
- Cryptography
- Reconnaissance
- Malware
- Hacking Windows
- Web Hacking
- Vulnerability Scanning
- Introduction to Linux
- Linux Hacking
- Introduction to Kali Linux
- General Hacking Techniques
- Introduction to Metasploit
- More with Metasploit
- Introduction to Scripting with Ruby
- General Hacking Knowledge
- Additional Pen Testing Topics
- A Sample Pen Test Project
Prerequisites
TOPBefore attending this course, students should have knowledge of the skills imparted in:
- EC-Council Certified Ethical Hacker (CEH)
- Certified Security Analyst (ECSA) training courses
Who Should Attend
TOPThis course is intended for:
- Security officers
- Security auditors
- Security professionals
- Site administrators
- Government and military workers who need to meet IA training requirements