Course Outline

Penetration Testing Process and Types

Vulnerability Assessment for Government

Red Team Skills

Penetration Testing Methodologies

Penetration Testing Tools

Metasploit Framework

Internal and External Network Penetration Testing

Firewall Penetration Testing

Windows Penetration Testing

Linux Penetration Testing

Web Application Penetration Testing

Database Penetration Testing

Physical Security Penetration Testing

Data Center Penetration Testing

Cloud Penetration Testing

Penetration Testing Reporting

Penetration Testing Reporting: Best Practices and Pitfalls to Avoid

Capture the Flag Lab for Government

Requirements

A solid understanding of TCP/IP protocols is necessary for government participants to enroll in this course. Ideally, attendees should also have some prior experience or training in ethical hacking methodologies.

Please note that programming experience is not required for government participation.

 35 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories