Audience
This course is also designed for:
- Penetration Tester
- Vulnerability Tester
- Security Analyst (II)
- Vulnerability Assessment Analyst
- Network Security Operations
- Application Security Vulnerability
$2,750.00
As organizations scramble to protect themselves and their customers against privacy or security breaches, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company. This course will assist you if you are pursuing the CompTIA PenTest+ certification, as tested in exam PT0-002 and includes an exam voucher, study guide, and practice exams
20 in stock (can be backordered)
This course is also designed for:
To ensure your success in this course, you should have:
After completing this course, you should be able to:
• Plan and scope penetration tests
• Conduct passive reconnaissance
• Perform non-technical tests to gather information
• Conduct active reconnaissance
• Analyze vulnerabilities
• Penetrate networks
• Exploit host-based vulnerabilities
• Test applications
• Complete post-exploit tasks
• Analyze and report penetration test results
Module 1: Scoping Organizational/Customer Requirements
Module 2: Defining the Rules of Engagement
Module 3: Footprinting and Gathering Intelligence
Module 4: Evaluating Human and Physical Vulnerabilities
Module 5: Preparing the Vulnerability Scan
Module 6: Scanning Logical Vulnerabilities
Module 7: Analyzing Scanning Results
Module 8: Avoiding Detection and Covering Tracks
Module 9: Exploiting the LAN and Cloud
Module 10: Testing Wireless Networks
Module 11: Targeting Mobile Devices
Module 12: Attacking Specialized Systems
Module 13: Web Application-Based Attacks
Module 14: Performing System Hacking
Module 15: Scripting and Software Development
Module 16: Leveraging the Attack: Pivot and Penetrate
Module 17: Communicating During the PenTesting Process
Module 18: Summarizing Report Components
Module 19: Recommending Remediation
Module 20: Performing Post-Report Delivery Activities
Click on the following link to see the current Course Schedule
Our minimum class-size is 3 for this course.
If there are no scheduled dates for this course, it can be customized to suit the time and skill needs of clients and it can be held online, at a rented location or at your premises.
Click on the following link below to arrange for a custom course: Enquire about a course date
Click on the following link below to arrange for a custom course: Enquire about a course date.
Product Information
CERTFICATE OF COMPLETION: Participants will receive a certificate of completion at the end of a course. This is not an official certification for the product and/or software. Our courses do indicate the appropriate certification exam(s) that the participant can sit. Data Vision Systems does not provide certification or deliver the certification exams. Participants are responsible for arranging and paying for the certification exams on the appropriate certification body.
CANCELLATION POLICY: There is never a fee for cancelling seven business days before a class for any reason. Data Vision Systems reserves the right to cancel any course due to insufficient registration or other extenuating circumstances. Participants will be advised prior to doing so
Reviews
There are no reviews yet.