Get in Touch

Course Outline

Core modules:

  1. The Necessity of Security Analysis
  2. TCP/IP Packet Analysis
  3. Methodologies for Penetration Testing
  4. Client Relations and Legal Agreements
  5. Rules of Engagement
  6. Planning and Scheduling Penetration Tests
  7. Pre-Test Preparatory Steps
  8. Information Gathering
  9. Vulnerability Assessment
  10. External Penetration Testing
  11. Internal Network Penetration Testing
  12. Firewall Penetration Testing
  13. Intrusion Detection System (IDS) Penetration Testing
  14. Password Cracking Techniques
  15. Social Engineering Penetration Testing
  16. Web Application Penetration Testing
  17. SQL Penetration Testing
  18. Post-Test Reporting and Actions

Additional Modules:

  1. Penetration Testing for Routers and Switches
  2. Wireless Network Penetration Testing
  3. Denial-of-Service (DoS) Penetration Testing
  4. Security Testing for Stolen Laptops, PDAs, and Mobile Phones
  5. Source Code Analysis and Testing
  6. Physical Security Penetration Testing
  7. Surveillance Camera Security Testing
  8. Database Penetration Testing
  9. VoIP Security Testing
  10. VPN Security Testing
  11. Cloud Infrastructure Penetration Testing
  12. Virtual Machine Security Testing
  13. Wardialing Techniques
  14. Virus and Trojan Detection
  15. Log Management Security Assessment
  16. File Integrity Monitoring
  17. Mobile Device Security Testing
  18. Telecommunication and Broadband Security Testing
  19. Email Security Testing
  20. Security Patch Assessment
  21. Data Leakage Prevention Testing
  22. SAP System Security Testing
  23. Standards and Regulatory Compliance
  24. Core Principles of Information System Security
  25. Incident Response for Information Systems
  26. Information System Auditing and Certification

Requirements

No prior prerequisites are required.

 35 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories