Course Code

NPen
 

     Duration

35 Hours
 
 

     Requirements

A firm understanding of TCP/IP Protocals is required to attend this course and ideally some prior experience and/or training in Ethical hacking methods.

Please note that programming experience is not required.

 

     Overview

This class will help the attendees to scan, test, hack and secure their own systems. To gain an in-depth knowledge and practical experience with the current essential security systems. The attendees will get to know how perimeter defences work and then be led into scanning and attacking their own networks, no real network is harmed. The attendees then will learn how intruders escalate privileges and what steps can be taken to secure a system, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

 

     Course Outline

Penetration Testing Process and Types

Vulnerability Assessment

Red Team skills

Penetration Testing Methodologies

Penetration Testing Tools

Metasploit Framework

Internal and External Network Penetration Testing

Firewall Penetration Testing

Windows Penetration Testing

Linux Penetration Testing

Web Application Penetration Testing

Database Penetration Testing

Physical Security Penetration Testing

Data Center Penetration Testing

Cloud Penetration Testing

Penetration Testing Reporting

Penetration Testing Reporting, do's and dont's

Capture the Flag lab

 

     Feedback (6)

I liked the in-depth knowledge about the subject of the trainer, good explanation, highlighting important things!.

Andreas Rhein


The delivery

- Department for Communities


Depth and breadth of the course. Trainer was excellent also.

- Department for Communities


Examples provided

- Department for Communities


Trainer's vast knowledge

FUJITSU TECHNOLOGY SOLUTIONS SP. Z O.O.


Martin was very knowledgeable and gave really good tips; he allowed plenty of time for discussion and allowing us to ask questions. It was really well delivered, even virtually which sometimes is a difficult medium to work with.

Kewal Rai - Knowledgepool Group Ltd


The course could be tailored to suit your needs and objectives. It can also be delivered on your premises if preferred.


  
  
  


  

Online Price per participant 6000 AED

  

Classroom Price per participant 6000 AED

Starts

 

Ends

 

  Workday courses take place between 9:30 and 16:30

Location


  Show venue details


Number of Participants






Related Courses

Total Courses 6


 
Information Security Risk

Information Security Risk

What is Information Security Risk?

CISA - Certified Information Systems Auditor

  28 hours

Building up information security according to ISO 27005

  21 hours

Open Data Risk Analysis and Management

  21 hours

 
Security Management

Security Management

What is Security Management?

CISM - Certified Information Security Manager

  28 hours

CISMP - Certificate in Information Security Management Principles

  21 hours

Computer Room Security and Maintenance

  14 hours

Cybersecurity Fundamentals

  21 hours

Open Authentication (OAuth)

  7 hours

Public Key Infrastructure

  21 hours

Security Policy Management

  35 hours

 
Information System Security

Information System Security

What is Information System Security?

Certified Information System Security Professional (CISSP) CBK Review

  35 hours

 

DevOps Security: Creating a DevOps Security Strategy

  7 hours

NB-IoT for Developers

  7 hours

 

IBM Qradar SIEM: Beginner to Advanced

  14 hours



Discounted Public Courses



This site in other countries/regions