- Home
- Cyber Security
- Certified Penetration Testing
Certified Penetration Testing Professional
Cyber Security
Description
Curriculum
Additional Self-Study Modules
Target Audience
Description
The most popular course, Penetration testing is focused on multiple skills required by today’s security professionals in finding vulnerabilities in systems and networks.
COURSE OVERVIEW
The course is focused on advanced approaches one can use to test loopholes and report them professionally for compliance. The aim of penetration testing is to emulate hacker attacks on the IT environment and identify any weaknesses, which may provide unauthorized access to systems or data. We employ the same manual techniques used by hackers to perform the attack. This allows us to identify vulnerabilities and conditions which would be neglected by automated testing methods.
Curriculum
Course Details
- Module 01: Introduction to Penetration Testing and Methodologies
- Module 02: Penetration Testing Scoping and Engagement
- Module 03: Open Source Intelligence
- Module 04: Social Engineering Penetration Testing
- Module 05: Network Penetration Testing (External)
- Module 06: Network Penetration Testing (Internal)
- Module 07: Network Penetration Testing – Perimeter Devices
- Module 08: Web Application Penetration Testing
- Module 09: Wireless Penetration Testing
- Module 10: IoT Penetration Testing
- Module 11: OT/SCADA Penetration Testing
- Module 12: Cloud Penetration Testing
- Module 13: Binary Analysis and Exploitation
- Module 14: Report Writing and Post Testing Actions
Additional Self-Study Modules
- Penetration Testing Essential Concepts
- Fuzzing
- Mastering Metasploit Framework
- PowerShell Scripting
- Bash Environment and Scripting
- Python Environment and Scripting
- Perl Environment and Scripting
- Ruby Environment and Scripting
- Active Directory Penetration Testing
- Database Penetration Testing
- Mobile Device Penetration Testing
Target Audience
- Ethical Hackers
- Penetration Testers
- Network Server Administrators
- Firewall Administrators
- Security Testers
- System Administrators and Risk Assessment Professionals
- Cybersecurity Forensic Analyst
- Cyberthreat Analyst
- Cloud Security
- Analyst Information Security Consultant
- Application Security Analyst
- Cybersecurity Assurance Engineer
- Security Operations Center (SOC) Analyst
- Technical Operations Network Engineer
- Information Security Engineer
- Network Security Penetration Tester
- Network Security Engineer
- Information Security Architect