Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Core modules:
- The necessity of Security Analysis
- TCP/IP Packet Analysis
- Penetration Testing Methodologies
- Customer and Legal Agreements
- Rules of Engagement
- Planning and Scheduling for Penetration Testing
- Pre-Penetration Testing Procedures
- Information Gathering
- Vulnerability Analysis
- External Penetration Testing
- Internal Network Penetration Testing
- Firewall Penetration Testing
- IDS Penetration Testing
- Password Cracking Penetration Testing
- Social Engineering Penetration Testing
- Web Application Penetration Testing
- SQL Penetration Testing
- Post-Testing Actions and Reporting
Additional Modules:
- Router and Switch Penetration Testing
- Wireless Network Penetration Testing
- Denial-of-Service Penetration Testing
- Penetration Testing for Stolen Laptops, PDAs, and Cell Phones
- Source Code Penetration Testing
- Physical Security Penetration Testing
- Surveillance Camera Penetration Testing
- Database Penetration Testing
- VoIP Penetration Testing
- VPN Penetration Testing
- Cloud Penetration Testing
- Virtual Machine Penetration Testing
- Wardialling
- Virus and Trojan Detection
- Log Management Penetration Testing
- File Integrity Checking
- Mobile Devices Penetration Testing
- Telecommunication and Broadband Communication Penetration Testing
- Email Security Penetration Testing
- Security Patches Penetration Testing
- Data Leakage Penetration Testing
- SAP Penetration Testing
- Standards and Compliance
- Information System Security Principles
- Information System Incident and Response
- Information System Auditing and Certification
Requirements
No prerequisites are required.
35 Hours
Testimonials (3)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
Overview of Risk topics and preparing for exam