Get in Touch

Course Outline

Core Modules:

  1. The Need for Security Analysis
  2. TCP/IP Packet Analysis
  3. Penetration Testing Methodologies
  4. Client Agreements and Legal Considerations
  5. Rules of Engagement
  6. Planning and Scheduling Penetration Tests
  7. Pre-Penetration Testing Activities
  8. Information Gathering
  9. Vulnerability Analysis
  10. External Penetration Testing
  11. Internal Network Penetration Testing
  12. Firewall Penetration Testing
  13. IDS Penetration Testing
  14. Password Cracking Penetration Testing
  15. Social Engineering Penetration Testing
  16. Web Application Penetration Testing
  17. SQL Penetration Testing
  18. Penetration Testing Reports and Post-Testing Actions

Additional Modules:

  1. Router and Switch Penetration Testing
  2. Wireless Network Penetration Testing
  3. Denial-of-Service Penetration Testing
  4. Penetration Testing of Stolen Laptops, PDAs, and Mobile Phones
  5. Source Code Penetration Testing
  6. Physical Security Penetration Testing
  7. Surveillance Camera Penetration Testing
  8. Database Penetration Testing
  9. VoIP Penetration Testing
  10. VPN Penetration Testing
  11. Cloud Penetration Testing
  12. Virtual Machine Penetration Testing
  13. War Dialling
  14. Virus and Trojan Detection
  15. Log Management Penetration Testing
  16. File Integrity Checking
  17. Mobile Device Penetration Testing
  18. Telecommunications and Broadband Communication Penetration Testing
  19. Email Security Penetration Testing
  20. Security Patch Penetration Testing
  21. Data Leakage Penetration Testing
  22. SAP Penetration Testing
  23. Standards and Compliance
  24. Information System Security Principles
  25. Information System Incident Response
  26. Information System Auditing and Certification

Requirements

No prerequisites are required.

 35 Hours

Number of participants


Price per participant

Testimonials (3)

Provisional Upcoming Courses (Require 5+ participants)

Related Categories