5 Days
- Information Security Analyst/Administrator
- Information Systems Security Engineer/Manager
- Information Security Professionals/Officers
- Information Security/IT Auditors
- Risk/Threat/Vulnerability Analyst
- System Administrators
- Network Administrators and Engineers
You will learn how to:Â
- Demonstrate a repeatable and measurable approach to Penetration TestingÂ
- Perform advanced techniques and attacks to identify SQL injection, Cross site scripting (XSS),Â
- LFI, RFI vulnerabilities in web applicationsÂ
- Perform privilege escalation to gain root access to a system Demonstrate ‘Out-of-the-box’Â
- and ‘lateral’ thinkingÂ
- Get access to proprietary EC-Council Penetration Testing methodologiesÂ
- Exploit vulnerabilities in Operating systems such as Windows, LinuxÂ
- Identify and bypass perimeter protectionsÂ
- Perl, Python and Ruby scripting for the penetration testerÂ
- Advanced post exploitation and persistenceÂ
- Extending Metasploit with custom modules and exploitsÂ
- Pivoting from external into internal networksÂ
- Avoiding the most common mistakes when drafting a professional penetration testing reportÂ
- Introduction to Vulnerability Assessment and Penetration TestingÂ
- Information Gathering MethodologyÂ
- Scanning and EnumerationÂ
- Identify VulnerabilitiesÂ
- ExploitationÂ
- Post ExploitationÂ
- Advanced Tips and TechniquesÂ
- Preparing a ReportÂ
- Practice RangesÂ
This training prepares you for the following certification:Â
Licensed Penetration TesterÂ
