5 Days
- Certified Ethical HackerÂ
- Possess a minimum of 2 years of working experience in a related InfoSec domain
- Information Security Analyst/Administrator
- Information Systems Security Engineer/Manager
- Information Security Professionals/Officers
- Information Security/IT Auditors
- Risk/Threat/Vulnerability Analyst
- System Administrators
- Network Administrators and Engineers
You will learn how to:Â
- Perform advanced network scans beyond perimeter defenses, leading to automated and manual vulnerability analysis, exploit selection, customization, launch and post exploitation maneuvers.Â
- Customize payloadsÂ
- Make critical decisions at different phases of a pen-testing engagementÂ
- Perform advanced network scans beyond perimeter defensesÂ
- Perform automated and manual vulnerability analysisÂ
- Customization, launch, and post exploitation maneuversÂ
- Perform a full-fledged Penetration Testing engagementÂ
- Create a professional pen-testing reportÂ
- Demonstrate the application of penetration testing methodology presented in the ECSA programÂ
- Penetration Testing Essential Concepts (Self-Study)Â
- Introduction to Penetration Testing and MethodologiesÂ
- Penetration Testing Scoping and Engagement MethodologyÂ
- Open-Source Intelligence (OSINT) MethodologyÂ
- Social Engineering Penetration Testing MethodologyÂ
- Network Penetration Testing Methodology – ExternalÂ
- Network Penetration Testing Methodology – InternalÂ
- Network Penetration Testing Methodology – Perimeter DevicesÂ
- Web Application Penetration Testing MethodologyÂ
- Database Penetration Testing MethodologyÂ
- Wireless Penetration Testing MethodologyÂ
- Cloud Penetration Testing MethodologyÂ
- Report Writing and Post Testing ActionsÂ
This course prepares you for the following certification:Â
- Ec-Council Certified Security AnalystÂ
