PENETRATION TESTING

It is an expert level hands on training for security testing professionals, who manages and oversees and execute security testing of enterprise’s critical information assets to identify vulnerabilities and to work diligently to mitigate them before the bad guys pounce.

What is in this course

Comprehensive hands on training is help you to master a repeatable, documentable penetration testing methodology that can be used in a penetration testing or hacking situation. This course includes installing Kali Linux, using VirtualBox, basics of Linux, Tor, Proxychains, VPN, Macchanger, Nmap, wireshark, cracking wifi, aircrack, DoS attacks, SLL strip, known vulnerabilities, SQL injections, cracking Linux passwords, and more topics how to attack from the web using different techniques likes cross site scripting (XSS), SQL injection, remote and local file inclusion and how to penetrate networks, exploit systems, break into computers, and compromise routers. During the course you will learn the deep and brute capabilities of the Metasploit to perform pen testing and vulnerability assessment for your organization. This program will help you to prepare and pass certifications like ECSA

Pen testing major training domains are as follows:

  • Introduction to Pen Testing
  • Information Gathering
  • Writing pen test proposals
  • Foot printing & scanning
  • Vulnerability Assessment
  • Web Attacks
  • System Attacks
  • Network Attacks
  • Reporting

Who should attend?

  • Pen Testers
  • IS Auditors
  • IS Consultants
  • Students
  • Has an interest in security testing

What course material you will get

Each student will get the hardcopies of the training manual includes training slides, supporting materials, tool and VMs.

Lab Assignments Exam

During the training students will pass through the real time pen testing challenges to demonstrate their proficiency.