Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Upon completion of this course, you will be able to demonstrate knowledge and understanding of:
- The Penetration Testing Process and Types
- Vulnerability Assessment Techniques
- Internal and External Network Penetration Testing Methods
- Penetrating Firewalls, Intrusion Prevention Systems/Intrusion Detection Systems (IPS/IDS), Servers, Wireless Networks, and Cloud Environments for government operations
- Network Capture the Flag (CTF) Exercises
- Wireless CTF Exercises
- Web Application CTF Exercises
- Servers CTF Exercises
Requirements
A solid understanding of TCP/IP protocols is essential. Programming knowledge is not required. Candidates should have a strong desire to learn about ethical hacking and to receive comprehensive penetration testing training for government applications.
14 Hours