A firm understanding of TCP/IP Protocals is required to attend this course and ideally some prior experience and/or training in Ethical hacking methods.
Please note that programming experience is not required.
This class will help the attendees to scan, test, hack and secure their own systems. To gain an in-depth knowledge and practical experience with the current essential security systems. The attendees will get to know how perimeter defences work and then be led into scanning and attacking their own networks, no real network is harmed. The attendees then will learn how intruders escalate privileges and what steps can be taken to secure a system, Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
Penetration Testing Process and Types
Red Team skills
Penetration Testing Methodologies
Penetration Testing Tools
Internal and External Network Penetration Testing
Firewall Penetration Testing
Windows Penetration Testing
Linux Penetration Testing
Web Application Penetration Testing
Database Penetration Testing
Physical Security Penetration Testing
Data Center Penetration Testing
Cloud Penetration Testing
Penetration Testing Reporting
Penetration Testing Reporting, do's and dont's
Capture the Flag lab
I liked the in-depth knowledge about the subject of the trainer, good explanation, highlighting important things!.
Depth and breadth of the course. Trainer was excellent also.
Trainer's vast knowledge
Martin was very knowledgeable and gave really good tips; he allowed plenty of time for discussion and allowing us to ask questions. It was really well delivered, even virtually which sometimes is a difficult medium to work with.
Total Courses 6