Course Outline

Core Modules:

  1. Need for Security Analysis
  2. TCP/IP Packet Analysis
  3. Penetration Testing Methodologies
  4. Customer and Legal Agreements
  5. Rules of Engagement
  6. Penetration Testing Planning and Scheduling
  7. Pre-Penetration Testing Steps
  8. Information Gathering
  9. Vulnerability Analysis
  10. External Penetration Testing
  11. Internal Network Pen Testing
  12. Firewall Penetration Testing
  13. Intrusion Detection System (IDS) Penetration Testing
  14. Password Cracking Penetration Testing
  15. Social Engineering Penetration Testing
  16. Web Application Penetration Testing
  17. SQL Penetration Testing
  18. Penetration Testing Reports and Post-Testing Actions

Additional Modules:

  1. Router and Switch Penetration Testing
  2. Wireless Network Penetration Testing
  3. Denial-of-Service (DoS) Penetration Testing
  4. Stolen Laptop, PDA, and Cell Phone Penetration Testing
  5. Source Code Penetration Testing
  6. Physical Security Penetration Testing
  7. Surveillance Camera Penetration Testing
  8. Database Penetration Testing
  9. Voice over IP (VoIP) Penetration Testing
  10. Virtual Private Network (VPN) Penetration Testing
  11. Cloud Penetration Testing
  12. Virtual Machine Penetration Testing
  13. War Dialing
  14. Virus and Trojan Detection
  15. Log Management Penetration Testing
  16. File Integrity Checking
  17. Mobile Device Penetration Testing
  18. Telecommunication and Broadband Communication Penetration Testing
  19. Email Security Penetration Testing
  20. Security Patch Penetration Testing
  21. Data Leakage Penetration Testing
  22. SAP Penetration Testing
  23. Standards and Compliance for Government
  24. Information System Security Principles
  25. Information System Incident and Response
  26. Information System Auditing and Certification

Requirements

No prerequisites are required for government.

 35 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories