Course Details
Course Outline
1 - Scoping Organizational/Customer Requirements
Topic 1A: Define Organizational PenTestingTopic 1B: Acknowledge Compliance RequirementsTopic 1C: Compare Standards and MethodologiesTopic 1D: Describe Ways to Maintain Professionalism
2 - Defining the Rules of Engagement
Topic 2A: Assess Environmental ConsiderationsTopic 2B: Outline the Rules of EngagementTopic 2C: Prepare Legal Documents
3 - Footprinting and Gathering Intelligence
Topic 3A: Discover the TargetTopic 3B: Gather Essential DataTopic 3C: Compile Website InformationTopic 3D: Discover Open-Source Intelligence Tools
4 - Evaluating Human and Physical Vulnerabilities
Topic 4A: Exploit the Human PsycheTopic 4B: Summarize Physical AttacksTopic 4C: Use Tools to Launch a Social Engineering Attack
5 - Preparing the Vulnerability Scan
Topic 5A: Plan the Vulnerability ScanTopic 5B: Detect DefensesTopic 5C: Utilize Scanning Tools
6 - Lesson 6: Scanning Logical Vulnerabilities
Topic 6A: Scan Identified TargetsTopic 6B: Evaluate Network TrafficTopic 6C: Uncover Wireless Assets
7 - Analyzing Scanning Results
Topic 7A: Discover Nmap and NSETopic 7B: Enumerate Network HostsTopic 7C: Analyze Output from Scans
8 - Avoiding Detection and Covering Tracks
Topic 8A: Evade DetectionTopic 8B: Use Steganography to Hide and ConcealTopic 8C: Establish a Covert Channel
9 - Exploiting the LAN and Cloud
Topic 9A: Enumerating HostsTopic 9B: Attack LAN ProtocolsTopic 9C: Compare Exploit ToolsTopic 9D: Discover Cloud VulnerabilitiesTopic 9E: Explore Cloud-Based Attacks
10 - Testing Wireless Networks
Topic 10A: Discover Wireless AttacksTopic 10B: Explore Wireless Tools
11 - Targeting Mobile Devices
Topic 11A: Recognize Mobile Device VulnerabilitiesTopic 11B: Launch Attacks on Mobile DevicesTopic 11C: Outline Assessment Tools for Mobile Devices
12 - Attacking Specialized Systems
Topic 12A: Identify Attacks on the IoTTopic 12B: Recognize Other Vulnerable SystemsTopic 12C: Explain Virtual Machine Vulnerabilities
13 - Web Application-Based Attacks
Topic 13A: Recognize Web VulnerabilitiesTopic 13B: Launch Session AttacksTopic 13C: Plan Injection AttacksTopic 13D: Identify Tools
14 - Performing System Hacking
Topic 14A: System HackingTopic 14B: Use Remote Access ToolsTopic 14C: Analyze Exploit Code
15 - Scripting and Software Development
Topic 15A: Analyzing Scripts and Code SamplesTopic 15B: Create Logic ConstructsTopic 15C: Automate Penetration Testing
16 - Leveraging the Attack: Pivot and Penetrate
Topic 16A: Test CredentialsTopic 16B: Move Throughout the SystemTopic 16C: Maintain Persistence
17 - Communicating During the PenTesting Process
Topic 17A: Define the Communication PathTopic 17B: Communication TriggersTopic 17C: Use Built-In Tools for Reporting
18 - Summarizing Report Components
Topic 18A: Identify Report AudienceTopic 18B: List Report ContentsTopic 18C: Define Best Practices for Reports
19 - Recommending Remediation
Topic 19A: Employ Technical ControlsTopic 19B: Administrative and Operational ControlsTopic 19C: Physical Controls
20 - Performing Post-Report Delivery Activities
Topic 20A: Post-Engagement CleanupTopic 20B: Follow-Up Actions
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
Penetration Tester
Security Consultant
Cloud Penetration Tester
Cloud Security Specialist
Network & Security Specialist
Web App Penetration Tester
Information Security Engineer
Security Analyst
Other Prerequisites
3–4 years of hands-on experience performing penetration tests, vulnerability assessments, and code analysis
Network+, Security, or equivalent certifications/knowledge