About Course
Course Content
MODULE 1: Scoping Organizational/Customer Requirements
MODULE 2: Defining the Rules of Engagement
MODULE 3: Footprinting and Gathering Intelligence
MODULE 4: Evaluating Human and Physical Vulnerabilities
MODULE 5: Preparing the Vulnerability Scan
MODULE 6: Scanning Logical Vulnerabilities
MODULE 7: Analyzing Scanning Results
MODULE 8: Avoiding Detection and Covering Tracks
MODULE 9: Exploiting the LAN and Cloud
MODULE 10: Testing Wireless Networks
MODULE 11: Targeting Mobile Devices
MODULE 12: Attacking Specialized Systems
MODULE 13: Web Application-Based Attacks
MODULE 14: Performing System Hacking
MODULE 15: Scripting and Software Development
MODULE 16: Leveraging the Attack: Pivot and Penetrate
MODULE 17: Communicating During the PenTesting Process
MODULE 18: Summarizing Report Components
MODULE 19: Recommending Remediation
Student Ratings & Reviews
No Review Yet