Course Outline

  • Scoping Organizational and Customer Requirements for Government
  • Defining the Rules of Engagement
  • Conducting Footprinting and Gathering Intelligence
  • Assessing Human and Physical Vulnerabilities
  • Preparing for Vulnerability Scanning
  • Scanning Logical Vulnerabilities
  • Analyzing Scanning Results
  • Avoiding Detection and Covering Tracks
  • Exploiting Local Area Networks and Cloud Environments
  • Testing Wireless Network Security
  • Targeting Mobile Devices for Vulnerabilities
  • Attacking Specialized Systems
  • Conducting Web Application-Based Attacks
  • Performing System Hacking Techniques
  • Scripting and Software Development for Exploits
  • Leveraging the Attack: Pivoting and Penetrating Further
  • Communicating Throughout the Penetration Testing Process
  • Summarizing Report Components for Comprehensive Analysis
  • Recommending Remediation Strategies
  • Conducting Post-Report Delivery Activities

Requirements

For government personnel, it is recommended to possess CompTIA Network+, Security+, or equivalent knowledge.

 35 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories