Course Outline

Upon completion of this course, you will be able to demonstrate knowledge and understanding of:

  • The Penetration Testing Process and Types
  • Vulnerability Assessment Techniques
  • Internal and External Network Penetration Testing Methods
  • Penetrating Firewalls, Intrusion Prevention Systems/Intrusion Detection Systems (IPS/IDS), Servers, Wireless Networks, and Cloud Environments for government operations
  • Network Capture the Flag (CTF) Exercises
  • Wireless CTF Exercises
  • Web Application CTF Exercises
  • Servers CTF Exercises

Requirements

A solid understanding of TCP/IP protocols is essential. Programming knowledge is not required. Candidates should have a strong desire to learn about ethical hacking and to receive comprehensive penetration testing training for government applications.
 14 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories