Course Outline
Penetration Testing Process and Types
Vulnerability Assessment for Government
Red Team Skills
Penetration Testing Methodologies
Penetration Testing Tools
Metasploit Framework
Internal and External Network Penetration Testing
Firewall Penetration Testing
Windows Penetration Testing
Linux Penetration Testing
Web Application Penetration Testing
Database Penetration Testing
Physical Security Penetration Testing
Data Center Penetration Testing
Cloud Penetration Testing
Penetration Testing Reporting
Penetration Testing Reporting: Best Practices and Pitfalls to Avoid
Capture the Flag Lab for Government
Requirements
A solid understanding of TCP/IP protocols is necessary for government participants to enroll in this course. Ideally, attendees should also have some prior experience or training in ethical hacking methodologies.
Please note that programming experience is not required for government participation.