Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Core Modules:
- Need for Security Analysis
- TCP/IP Packet Analysis
- Penetration Testing Methodologies
- Client and Legal Agreements
- Rules of Engagement
- Penetration Testing Planning and Scheduling
- Pre-Penetration Testing Steps
- Information Gathering
- Vulnerability Analysis
- External Penetration Testing
- Internal Network Penetration Testing
- Firewall Penetration Testing
- IDS Penetration Testing
- Password Cracking Penetration Testing
- Social Engineering Penetration Testing
- Web Application Penetration Testing
- SQL Penetration Testing
- Penetration Testing Reports and Post-Testing Actions
Additional Modules:
- Router and Switch Penetration Testing
- Wireless Network Penetration Testing
- Denial-of-Service Penetration Testing
- Penetration Testing for Stolen Laptops, PDAs, and Cell Phones
- Source Code Penetration Testing
- Physical Security Penetration Testing
- Surveillance Camera Penetration Testing
- Database Penetration Testing
- VoIP Penetration Testing
- VPN Penetration Testing
- Cloud Penetration Testing
- Virtual Machine Penetration Testing
- Wardialing
- Virus and Trojan Detection
- Log Management Penetration Testing
- File Integrity Checking
- Mobile Device Penetration Testing
- Telecommunication and Broadband Communication Penetration Testing
- Email Security Penetration Testing
- Security Patch Penetration Testing
- Data Leakage Penetration Testing
- SAP Penetration Testing
- Standards and Compliance
- Information System Security Principles
- Information System Incident and Response
- Information System Auditing and Certification
Requirements
No prerequisites required
35 Hours
Testimonials (3)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
Overview of Risk topics and preparing for exam