Course Details
Course Outline
1 - Course Outline
Introduction to Penetration Testing Penetration Testing Scoping and EngagementOpen Source Intelligence (OSINT)Social Engineering Penetration TestingNetwork Penetration Testing – ExternalNetwork Penetration Testing – InternalNetwork Penetration Testing - Perimeter DevicesWeb Application Penetration Testing Wireless Penetration Testing IoT Penetration TestingOT/SCADA Penetration Testing Cloud Penetration TestingBinary Analysis and ExploitationReport Writing and Post-Testing Actions
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
This course is intended for Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals, Cybersecurity Forensic Analyst, Cyberthreat Analyst, Cloud Security, Analyst Information Security Consultant, Application Security Analyst, Cybersecurity Assurance Engineer, Security Operations Center (SOC) Analyst, Technical Operations Network Engineer, Information Security Engineer, Network Security Penetration Tester, Network Security Engineer, Information Security Architect.